Security News
Oracle Drags Its Feet in the JavaScript Trademark Dispute
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.
Sniffer aims to help:
Sniffer supports most common HTTP accessing libraries:
Add this line to your application's Gemfile:
gem 'sniffer'
If you wish Sniffer to use Module#prepend
instead of alias_method
, you can cause individual adapters to use prepend
instead with:
gem 'sniffer', require: ['http_prepend', 'httpclient_prepend', 'sniffer']
It's important that 'sniffer'
is the last item in the list. See the lib
directory for a list of prependable adapters.
If you want all adapters to use prepend
:
gem 'sniffer', require: ['all_prepend', 'sniffer']
And then execute:
$ bundle
Or install it yourself as:
$ gem install sniffer
Here's some simple examples to get you started:
require 'http'
require 'sniffer'
Sniffer.enable!
HTTP.get('http://example.com/?lang=ruby&author=matz')
Sniffer.data[0].to_h
# => {:request=>
# {:host=>"example.com",
# :query=>"/?lang=ruby&author=matz",
# :port=>80,
# :headers=>{"Accept-Encoding"=>"gzip;q=1.0,deflate;q=0.6,identity;q=0.3", "Connection"=>"close"},
# :body=>"",
# :method=>:get},
# :response=>
# {:status=>200,
# :headers=>
# {"Content-Encoding"=>"gzip",
# "Cache-Control"=>"max-age=604800",
# "Content-Type"=>"text/html",
# "Date"=>"Thu, 26 Oct 2017 13:47:00 GMT",
# "Etag"=>"\"359670651+gzip\"",
# "Expires"=>"Thu, 02 Nov 2017 13:47:00 GMT",
# "Last-Modified"=>"Fri, 09 Aug 2013 23:54:35 GMT",
# "Server"=>"ECS (lga/1372)",
# "Vary"=>"Accept-Encoding",
# "X-Cache"=>"HIT",
# "Content-Length"=>"606",
# "Connection"=>"close"},
# :body=> "OK",
# :timing=>0.23753299983218312}}
You can clear saved data
Sniffer.clear!
You can configure capacity of storage to prevent the huge memory usage and set up log rotation. By default log rotation is active (when capacity is set) and log works like a queue. If rotation is disabled - requests will be logged until result log size reaches the capacity.
# will fill the storage and stop logging
Sniffer.config.store = {capacity: 1000, rotate: false}
# will rotate logs to fit 1000 results (rotate is true by default)
Sniffer.config.store = {capacity: 1000}
You can reset config to default
Sniffer.reset!
You can enable and disable Sniffer
Sniffer.enable!
Sniffer.disable!
By default output log looks like that:
D, [2017-10-26T16:47:14.007152 #59511] DEBUG -- : {"port":80,"host":"example.com","query":"/?lang=ruby&author=matz","rq_connection":"close","method":"get","request_body":"","status":200,"rs_accept_ranges":"bytes","rs_cache_control":"max-age=604800","rs_content_type":"text/html","rs_date":"Thu, 26 Oct 2017 13:47:13 GMT","rs_etag":"\"359670651+gzip\"","rs_expires":"Thu, 02 Nov 2017 13:47:13 GMT","rs_last_modified":"Fri, 09 Aug 2013 23:54:35 GMT","rs_server":"ECS (lga/1385)","rs_vary":"Accept-Encoding","rs_x_cache":"HIT","rs_content_length":"1270","rs_connection":"close","timing":0.513012999901548,"response_body":"OK"}
where rq_xxx
is request header and rs_xxx
- response header
Sniffer default options:
Sniffer.config do |c|
c.logger = Logger.new($stdout)
c.severity = Logger::Severity::DEBUG
# HTTP options to log
c.log = {
request_url: true,
request_headers: true,
request_body: true,
request_method: true,
response_status: true,
response_headers: true,
response_body: true,
timing: true
}
c.store = true # save requests/responses to Sniffer.data
c.enabled = false # Sniffer disabled by default
c.url_whitelist = nil
c.url_blacklist = nil
end
You can add specific host url to whitelist as regexp or string. Sniffer will store only requests that matched.
Sniffer.config.url_whitelist = /whitelisted.com/
HTTP.get('http://example.com')
Sniffer.data[0].to_h
# => {}
HTTP.get('http://whitelisted.com/')
Sniffer.data[0].to_h
# => {{:request=>{:host=>"whitelisted.com", ....}}
You can add specific host url to blacklist as regexp or string. Sniffer will ignore all matched requests.
Sniffer.config.url_blacklist = /blacklisted.com/
HTTP.get('http://blacklisted.com')
Sniffer.data[0].to_h
# => {}
HTTP.get('http://example.com')
Sniffer.data[0].to_h
# => {{:request=>{:host=>"example.com", ...}}
You can add the middleware to run custom code before/after the sniffed data was logged.
Sniffer.middleware do |chain|
chain.add MyHook
end
class MyHook
def request(data_item)
puts "Before work"
yield
puts "After work"
end
def response(data_item)
puts "Before work"
yield
puts "After work"
end
end
After checking out the repo, run bin/setup
to install dependencies. Then, run rake spec
to run the tests. You can also run bin/console
for an interactive prompt that will allow you to experiment.
To install this gem onto your local machine, run bundle exec rake install
. To release a new version, update the version number in version.rb
, and then run bundle exec rake release
, which will create a git tag for the version, push git commits and tags, and push the .gem
file to rubygems.org.
Get local development environment working and tests running is very easy with docker-compose:
docker-compose run app bundle
docker-compose run app bundle exec rspec
Bug reports and pull requests are welcome on GitHub at https://github.com/aderyabin/sniffer. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the Contributor Covenant code of conduct.
The gem is available as open source under the terms of the MIT License.
Everyone interacting in the Sniffer project’s codebases, issue trackers, chat rooms and mailing lists is expected to follow the code of conduct.
FAQs
Unknown package
We found that sniffer demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.
Security News
The Linux Foundation is warning open source developers that compliance with global sanctions is mandatory, highlighting legal risks and restrictions on contributions.
Security News
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.