-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Permalink
Choose a base ref
{{ refName }}
default
Choose a head ref
{{ refName }}
default
Comparing changes
Choose two branches to see what’s changed or to start a new pull request.
If you need to, you can also or
learn more about diff comparisons.
Open a pull request
Create a new pull request by comparing changes across two branches. If you need to, you can also .
Learn more about diff comparisons here.
base repository: rack/rack
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v3.1.12
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
...
head repository: rack/rack
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v3.1.16
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
- 11 commits
- 14 files changed
- 6 contributors
Commits on Apr 13, 2025
-
Configuration menu - View commit details
-
Copy full SHA for 8e3c9b1 - Browse repository at this point
Copy the full SHA 8e3c9b1View commit details -
Configuration menu - View commit details
-
Copy full SHA for 0379537 - Browse repository at this point
Copy the full SHA 0379537View commit details
Commits on May 6, 2025
-
* Apply bytesize and number of param limits in QueryParser The param limit is 4096, chosen because it matches the existing multipart limit. The bytesize limit is 4MB. These limits should substantially exceed what almost all applications need, though there will likely be applications that require higher limits. Allow overriding the limits on a per-QueryParser basis via the constructors, and allow overriding the default limits with environment variables RACK_QUERY_PARSER_BYTESIZE_LIMIT and RACK_QUERY_PARSER_PARAMS_LIMIT. Add new Rack::QueryParser::QueryLimitError to raise in case one of the limits are exceeded, and make ParamsTooDeepError an alias to, since that is also a case where a limit is exceeded. This allows code that already rescues ParamsTooDeepError to automatically handle these other limits as well. * Update CHANGELOG. --------- Co-authored-by: Samuel Williams <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for cd6b70a - Browse repository at this point
Copy the full SHA cd6b70aView commit details -
Configuration menu - View commit details
-
Copy full SHA for 5440b2c - Browse repository at this point
Copy the full SHA 5440b2cView commit details
Commits on May 16, 2025
-
Configuration menu - View commit details
-
Copy full SHA for 0ac5c57 - Browse repository at this point
Copy the full SHA 0ac5c57View commit details
Commits on May 17, 2025
-
Replace usage of
CGI::Cookie
(#2328)In Ruby 3.5, `cgi` will only contain functions related to escaping/unescaping. https://bugs.ruby-lang.org/issues/21258 This is not an exact replicate of course, (`CGI::Cookie`) has some validations and coerces on setters but considering for that purpose this is, they don't seem necessary? During construction of the object rack already does conversions as necessary and setters don't make much sense, and aren't documented/tested for. Although, for improved backwards compatibility, it wouldn't be much effort to make them `attr_accesor` instead.
Configuration menu - View commit details
-
Copy full SHA for 3c1a46d - Browse repository at this point
Copy the full SHA 3c1a46dView commit details
Commits on May 18, 2025
-
Configuration menu - View commit details
-
Copy full SHA for bd60f6e - Browse repository at this point
Copy the full SHA bd60f6eView commit details -
Configuration menu - View commit details
-
Copy full SHA for 835e15b - Browse repository at this point
Copy the full SHA 835e15bView commit details
Commits on May 22, 2025
-
Configuration menu - View commit details
-
Copy full SHA for 352650a - Browse repository at this point
Copy the full SHA 352650aView commit details
Commits on Jun 4, 2025
-
Fix ReDoS and consistency in multipart regexes
[CVE-2025-49007] There is a ReDoS in multipart parsing here because it is not anchored to the start of a line and so may match as part of its comments. Previously in f92e056 Content-ID and Content-Type were changed to only accept tab and space as whitespace characters. Although that's what the various RFCs show as their BNF, I that's supposed to be interpreted _after_ lines have been unfolded and so we need to allow FWS "Foldable White Space". CR is not allowed unescaped as part of quoted-string. It might be technically valid with a leading backslash, but I don't believe that case is worth supporting. Co-authored-by: Matthew Draper <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for aed514d - Browse repository at this point
Copy the full SHA aed514dView commit details -
Configuration menu - View commit details
-
Copy full SHA for df2f3f2 - Browse repository at this point
Copy the full SHA df2f3f2View commit details
Loading
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v3.1.12...v3.1.16