diff --git a/samples/HelloWorld/HelloWorld.kproj b/samples/HelloWorld/HelloWorld.kproj index 41a114cdcb..878b876200 100644 --- a/samples/HelloWorld/HelloWorld.kproj +++ b/samples/HelloWorld/HelloWorld.kproj @@ -19,9 +19,6 @@ - - - diff --git a/src/Microsoft.AspNet.Server.WebListener/NativeInterop/SocketAddress.cs b/src/Microsoft.AspNet.Server.WebListener/NativeInterop/SocketAddress.cs index 26d92e61e0..78b52c13c7 100644 --- a/src/Microsoft.AspNet.Server.WebListener/NativeInterop/SocketAddress.cs +++ b/src/Microsoft.AspNet.Server.WebListener/NativeInterop/SocketAddress.cs @@ -170,7 +170,7 @@ namespace Microsoft.AspNet.Server.WebListener } return _hash; } -#if NET45 + internal IPAddress GetIPAddress() { if (Family == AddressFamily.InterNetworkV6) @@ -200,7 +200,7 @@ namespace Microsoft.AspNet.Server.WebListener Contract.Assert(Size >= IPv4AddressSize); return new IPAddress(new byte[] { _buffer[4], _buffer[5], _buffer[6], _buffer[7] }); } -#endif + public override string ToString() { StringBuilder bytes = new StringBuilder(); diff --git a/src/Microsoft.AspNet.Server.WebListener/RequestProcessing/ClientCertLoader.cs b/src/Microsoft.AspNet.Server.WebListener/RequestProcessing/ClientCertLoader.cs index 3cd17db788..d5efd0b12e 100644 --- a/src/Microsoft.AspNet.Server.WebListener/RequestProcessing/ClientCertLoader.cs +++ b/src/Microsoft.AspNet.Server.WebListener/RequestProcessing/ClientCertLoader.cs @@ -4,8 +4,6 @@ // // ----------------------------------------------------------------------- -#if NET45 - using System; using System.Diagnostics.CodeAnalysis; using System.Diagnostics.Contracts; @@ -343,5 +341,3 @@ namespace Microsoft.AspNet.Server.WebListener } } } - -#endif \ No newline at end of file diff --git a/src/Microsoft.AspNet.Server.WebListener/RequestProcessing/FeatureContext.cs b/src/Microsoft.AspNet.Server.WebListener/RequestProcessing/FeatureContext.cs index 81f20ef260..b52beb029f 100644 --- a/src/Microsoft.AspNet.Server.WebListener/RequestProcessing/FeatureContext.cs +++ b/src/Microsoft.AspNet.Server.WebListener/RequestProcessing/FeatureContext.cs @@ -2,9 +2,7 @@ using System.Collections.Generic; using System.IO; using System.Net; -#if NET45 using System.Security.Cryptography.X509Certificates; -#endif using System.Threading; using System.Threading.Tasks; using Microsoft.AspNet.FeatureModel; @@ -12,10 +10,7 @@ using Microsoft.AspNet.HttpFeature; namespace Microsoft.AspNet.Server.WebListener { - internal class FeatureContext : IHttpRequestInformation, IHttpConnection, IHttpResponseInformation, IHttpSendFile -#if NET45 - , IHttpTransportLayerSecurity -#endif + internal class FeatureContext : IHttpRequestInformation, IHttpConnection, IHttpResponseInformation, IHttpSendFile, IHttpTransportLayerSecurity { private RequestContext _requestContext; private FeatureCollection _features; @@ -28,16 +23,12 @@ namespace Microsoft.AspNet.Server.WebListener private string _query; private string _pathBase; private string _path; -#if NET45 private IPAddress _remoteIpAddress; private IPAddress _localIpAddress; -#endif private int? _remotePort; private int? _localPort; private bool? _isLocal; -#if NET45 private X509Certificate _clientCert; -#endif private Stream _responseStream; private IDictionary _responseHeaders; @@ -69,10 +60,8 @@ namespace Microsoft.AspNet.Server.WebListener _features.Add(typeof(IHttpConnection), this); if (Request.IsSecureConnection) { -#if NET45 // TODO: Should this feature be conditional? Should we add this for HTTP requests? _features.Add(typeof(IHttpTransportLayerSecurity), this); -#endif } _features.Add(typeof(IHttpResponseInformation), this); _features.Add(typeof(IHttpSendFile), this); @@ -90,7 +79,7 @@ namespace Microsoft.AspNet.Server.WebListener */ } -#region IHttpRequestInformation + #region IHttpRequestInformation Stream IHttpRequestInformation.Body { @@ -207,8 +196,8 @@ namespace Microsoft.AspNet.Server.WebListener } set { _scheme = value; } } -#endregion -#region IHttpConnection + #endregion + #region IHttpConnection bool IHttpConnection.IsLocal { get @@ -221,7 +210,7 @@ namespace Microsoft.AspNet.Server.WebListener } set { _isLocal = value; } } -#if NET45 + IPAddress IHttpConnection.LocalIpAddress { get @@ -247,7 +236,7 @@ namespace Microsoft.AspNet.Server.WebListener } set { _remoteIpAddress = value; } } -#endif + int IHttpConnection.LocalPort { get @@ -273,9 +262,8 @@ namespace Microsoft.AspNet.Server.WebListener } set { _remotePort = value; } } -#endregion -#region IHttpTransportLayerSecurity -#if NET45 + #endregion + #region IHttpTransportLayerSecurity X509Certificate IHttpTransportLayerSecurity.ClientCertificate { get @@ -296,9 +284,8 @@ namespace Microsoft.AspNet.Server.WebListener _clientCert = await Request.GetClientCertificateAsync(); } } -#endif -#endregion -#region IHttpResponseInformation + #endregion + #region IHttpResponseInformation Stream IHttpResponseInformation.Body { get @@ -341,7 +328,7 @@ namespace Microsoft.AspNet.Server.WebListener get { return Response.StatusCode; } set { Response.StatusCode = value; } } -#endregion + #endregion Task IHttpSendFile.SendFileAsync(string path, long offset, long? length, CancellationToken cancellation) { return Response.SendFileAsync(path, offset, length, cancellation); diff --git a/src/Microsoft.AspNet.Server.WebListener/RequestProcessing/Request.cs b/src/Microsoft.AspNet.Server.WebListener/RequestProcessing/Request.cs index 3535dc3612..5b7875cd08 100644 --- a/src/Microsoft.AspNet.Server.WebListener/RequestProcessing/Request.cs +++ b/src/Microsoft.AspNet.Server.WebListener/RequestProcessing/Request.cs @@ -10,9 +10,7 @@ using System.Globalization; using System.IO; using System.Net; using System.Runtime.InteropServices; -#if NET45 using System.Security.Cryptography.X509Certificates; -#endif using System.Security.Principal; using System.Threading; using System.Threading.Tasks; @@ -41,9 +39,7 @@ namespace Microsoft.AspNet.Server.WebListener private string _pathBase; private string _path; -#if NET45 private X509Certificate _clientCert; -#endif private IDictionary _headers; private BoundaryType _contentBoundaryType; @@ -270,11 +266,7 @@ namespace Microsoft.AspNet.Server.WebListener { get { -#if NET45 return LocalEndPoint.GetIPAddress().Equals(RemoteEndPoint.GetIPAddress()); -#else - throw new NotImplementedException(); -#endif } } @@ -337,7 +329,7 @@ namespace Microsoft.AspNet.Server.WebListener return _localEndPoint; } } -#if NET45 + public IPAddress RemoteIpAddress { get { return RemoteEndPoint.GetIPAddress(); } @@ -347,7 +339,7 @@ namespace Microsoft.AspNet.Server.WebListener { get { return LocalEndPoint.GetIPAddress(); } } -#endif + public int RemotePort { get { return RemoteEndPoint.GetPort(); } @@ -432,7 +424,6 @@ namespace Microsoft.AspNet.Server.WebListener return UnsafeNclNativeMethods.HttpApi.GetKnownVerb(RequestBuffer, OriginalBlobAddress); } -#if NET45 // Populates the client certificate. The result may be null if there is no client cert. // TODO: Does it make sense for this to be invoked multiple times (e.g. renegotiate)? Client and server code appear to // enable this, but it's unclear what Http.Sys would do. @@ -470,7 +461,6 @@ namespace Microsoft.AspNet.Server.WebListener } return _clientCert; } -#endif // Use this to save the blob from dispose if this object was never used (never given to a user) and is about to be // disposed.