module Sprockets::Server
def body_only?(env)
def body_only?(env) env["QUERY_STRING"].to_s =~ /body=(1|t)/ end
def call(env)
A request for `"/assets/foo/bar.js"` will search your
end
run Sprockets::Environment.new
map "/assets" do
in the path.
Mapping your environment at a url prefix will serve all assets
headers, and body.
`env` Hash and returns a three item tuple with the status code,
`call` implements the Rack 1.x specification which accepts an
def call(env) start_time = Time.now.to_f time_elapsed = lambda { ((Time.now.to_f - start_time) * 1000).to_i } msg = "Served asset #{env['PATH_INFO']} -" # URLs containing a `".."` are rejected for security reasons. if forbidden_request?(env) return forbidden_response end # Mark session as "skipped" so no `Set-Cookie` header is set env['rack.session.options'] ||= {} env['rack.session.options'][:defer] = true env['rack.session.options'][:skip] = true # Extract the path from everything after the leading slash path = unescape(env['PATH_INFO'].to_s.sub(/^\//, '')) # Look up the asset. asset = find_asset(path) asset.to_a if asset # `find_asset` returns nil if the asset doesn't exist if asset.nil? logger.info "#{msg} 404 Not Found (#{time_elapsed.call}ms)" # Return a 404 Not Found not_found_response # Check request headers `HTTP_IF_MODIFIED_SINCE` and # `HTTP_IF_NONE_MATCH` against the assets mtime and digest elsif not_modified?(asset, env) || etag_match?(asset, env) logger.info "#{msg} 304 Not Modified (#{time_elapsed.call}ms)" # Return a 304 Not Modified not_modified_response(asset, env) else logger.info "#{msg} 200 OK (#{time_elapsed.call}ms)" # Return a 200 with the asset contents ok_response(asset, env) end rescue Exception => e logger.error "Error compiling asset #{path}:" logger.error "#{e.class.name}: #{e.message}" case content_type_of(path) when "application/javascript" # Re-throw JavaScript asset exceptions to the browser logger.info "#{msg} 500 Internal Server Error\n\n" return javascript_exception_response(e) when "text/css" # Display CSS asset exceptions in the browser logger.info "#{msg} 500 Internal Server Error\n\n" return css_exception_response(e) else raise end end
def css_exception_response(exception)
Returns a CSS response that hides all elements on the page and
def css_exception_response(exception) message = "\n#{exception.class.name}: #{exception.message}" backtrace = "\n #{exception.backtrace.first}" body = <<-CSS html { padding: 18px 36px; } head { display: block; } body { margin: 0; padding: 0; } body > * { display: none !important; } head:after, body:before, body:after { display: block !important; } head:after { font-family: sans-serif; font-size: large; font-weight: bold; content: "Error compiling CSS asset"; } body:before, body:after { font-family: monospace; white-space: pre-wrap; } body:before { font-weight: bold; content: "#{escape_css_content(message)}"; } body:after { content: "#{escape_css_content(backtrace)}"; } CSS [ 200, { "Content-Type" => "text/css;charset=utf-8", "Content-Length" => Rack::Utils.bytesize(body).to_s }, [ body ] ] end
def escape_css_content(content)
def escape_css_content(content) content. gsub('\\', '\\\\005c '). gsub("\n", '\\\\000a '). gsub('"', '\\\\0022 '). gsub('/', '\\\\002f ') end
def etag(asset)
def etag(asset) %("#{asset.digest}") end
def etag_match?(asset, env)
def etag_match?(asset, env) env["HTTP_IF_NONE_MATCH"] == etag(asset) end
def forbidden_request?(env)
def forbidden_request?(env) # Prevent access to files elsewhere on the file system # # http://example.org/assets/../../../etc/passwd # env["PATH_INFO"].include?("..") end
def forbidden_response
def forbidden_response [ 403, { "Content-Type" => "text/plain", "Content-Length" => "9" }, [ "Forbidden" ] ] end
def headers(env, asset, length)
def headers(env, asset, length) Hash.new.tap do |headers| # Set content type and length headers headers["Content-Type"] = asset.content_type headers["Content-Length"] = length.to_s # Set caching headers headers["Cache-Control"] = "public" headers["Last-Modified"] = asset.mtime.httpdate headers["ETag"] = etag(asset) # If the request url contains a fingerprint, set a long # expires on the response if attributes_for(env["PATH_INFO"]).path_fingerprint headers["Cache-Control"] << ", max-age=31536000" # Otherwise set `must-revalidate` since the asset could be modified. else headers["Cache-Control"] << ", must-revalidate" end end end
def javascript_exception_response(exception)
Returns a JavaScript response that re-throws a Ruby exception
def javascript_exception_response(exception) err = "#{exception.class.name}: #{exception.message}" body = "throw Error(#{err.inspect})" [ 200, { "Content-Type" => "application/javascript", "Content-Length" => Rack::Utils.bytesize(body).to_s }, [ body ] ] end
def not_found_response
def not_found_response [ 404, { "Content-Type" => "text/plain", "Content-Length" => "9", "X-Cascade" => "pass" }, [ "Not found" ] ] end
def not_modified?(asset, env)
Compare the requests `HTTP_IF_MODIFIED_SINCE` against the
def not_modified?(asset, env) env["HTTP_IF_MODIFIED_SINCE"] == asset.mtime.httpdate end
def not_modified_response(asset, env)
def not_modified_response(asset, env) [ 304, {}, [] ] end
def ok_response(asset, env)
def ok_response(asset, env) if body_only?(env) [ 200, headers(env, asset, Rack::Utils.bytesize(asset.body)), [asset.body] ] else [ 200, headers(env, asset, asset.length), asset ] end end
def unescape(str)
def unescape(str) str = URI::DEFAULT_PARSER.unescape(str) str.force_encoding(Encoding.default_internal) if Encoding.default_internal str end
def unescape(str)
def unescape(str) URI.unescape(str) end