Commit Graph

133 Commits

Author SHA1 Message Date
Pavel Krymets a35e5a02c3 Bring Microsoft.NETCore.Platforms dependency back 2016-04-18 17:07:34 -07:00
Pavel Krymets 8570acbb73 Migrate tests, tools and samples to portable 2016-04-15 09:51:51 -07:00
John Luo 921af14e1f Move web.config and use ANCM 2016-04-11 10:14:07 -07:00
Kiran Challa 330200874d Changed DNX451 references to NET451 2016-04-08 15:04:49 -07:00
Pranav K 04a4772fe5 Removing imports from src projects 2016-04-08 06:49:20 -07:00
Pranav K 1e90efdf32 Updating to release. 2016-04-06 09:47:42 -07:00
Ryan Nowak 37c8f5de70 Revert "Add antiforgery middleware"
This reverts commit 4629148519.
2016-04-01 09:10:33 -07:00
Pranav K fab3bfd237 Remove bower \ gulp from sample 2016-03-31 07:01:27 -07:00
Doug Bunting 65a2b8d25b React to HttpAbstractions namespace changes
- aspnet/HttpAbstractions#549 and aspnet/HttpAbstractions#592
- clean up `using`s
2016-03-30 16:13:12 -07:00
John Luo d0ed4f8688 Reacting to Kestrel extensions 2016-03-30 15:54:02 -07:00
Victor Hurdugaci ea4b94a757 Add webhook notification 2016-03-30 10:27:16 -07:00
jacalvar 0bc42a9b21 Return IServiceCollection from AddAntiforgery extension methods 2016-03-28 14:59:24 -07:00
Doug Bunting 0c81df8591 An `ObjectPoolProvider` is always registered
- react to aspnet/Hosting/pull#673
2016-03-25 11:19:23 -07:00
David Fowler c6f7a3434e Fixed build 2016-03-25 10:50:06 -07:00
John Luo 4d64c1849d Reacting to Hosting changes 2016-03-24 12:01:19 -07:00
ryanbrandenburg 94cefde3ec Make IAntiforgeryContextAccessor a Feature 2016-03-23 14:35:26 -07:00
jacalvar c237f8989a React to changes in DataProtection 2016-03-15 16:26:57 -07:00
Pranav K ddde171fcb Reacting to Hosting changes 2016-03-14 20:53:27 -07:00
Ajay Bhargav Baaskaran 33c91afbb2 Updated Json.Net version 2016-03-14 14:33:08 -07:00
Pranav K 162cb428cc Fixing CI build failure
Removing unused npm references
2016-03-12 09:45:03 -08:00
Nate McMaster a3f564e3d1 Fix backslashes in yml config.
[ci skip]
2016-03-09 17:44:49 -08:00
= fb28bacda1 Target net451 so functional tests execute with xunit runner on linux 2016-03-09 17:21:05 -08:00
Nate McMaster 6f7b554496 Limit the branches that build on our public CI.
[ci skip]
2016-03-09 16:25:31 -08:00
Victor Hurdugaci 42417a985e Update the build scripts to the latest version 2016-03-07 20:55:02 -08:00
Eilon Lipton 1d78d51cb1 Fix package metadata 2016-03-06 21:07:21 -08:00
John Luo 91b955e080 Update cookie name 2016-03-03 22:48:13 -08:00
Ajay Bhargav Baaskaran 91f44549ac Added Company, Copyright and Product attributes to AssemblyInfo 2016-03-03 17:33:26 -08:00
Doug Bunting 260f1b7db9 Remove project name from output path
- aspnet/Coherence-Signed#187
- remove `<RootNamespace>` settings but maintain other unique aspects e.g. `<DnxInvisibleContent ... />`
- in a few cases, standardize on VS version `14.0` and not something more specific
2016-03-02 15:21:47 -08:00
N. Taylor Mullen f9b9dcd79b Transition to netstandard.
- dotnet5.X => netstandard1.y (where y = x-1).
- DNXCore50 => netstandardapp1.5.
- Applied the same changes to ifdefs.
2016-03-01 13:36:35 -08:00
Victor Hurdugaci db2093ec2a Return the error code from build.cmd 2016-02-28 10:12:16 -08:00
Victor Hurdugaci 6e3518dafc Update the build scripts 2016-02-27 12:51:13 -08:00
jacalvar aa8fd48c64 Updated antiforgery ServiceCollectionExtensions 2016-02-26 16:13:10 -08:00
Ryan Nowak 4629148519 [Design] Add antiforgery middleware
This new middleware participates in authentication and acts as a filter
when the request doesn't include a valid CSRF token for a POST.

Any authentication middleware that you want to validate an antiforgery
token should go ahead of this middleware in the pipeline (Cookies,
IISIntegration). This also takes care of automatic auth (Windows) done by
weblistener.

Any authentication middleware that you want to ignore antiforgery should
go after this middleware in the pipeline.

To facilitate this, there are a few changes in the antiforgery API
surface. Namely we can now pass in a principal to validate tokens. You
can't pass in a principal to generate tokens - we expect you to be logged
in at that poing. Also, ValidateRequestAsync(...) now checks the HTTP verb
and won't validate GETs and such.
2016-02-24 15:04:09 -08:00
Doug Bunting 9783a7c42b Update `build.cmd` to match latest template
- aspnet/Universe#347
- `%KOREBUILD_VERSION%` doesn't work without this fix
2016-02-24 12:27:40 -08:00
Doug Bunting 478edc1735 Pool `char`s used for base64url-encoding and -decoding
- #23 part 4
- depends on aspnet/HttpAbstractions@8c120a0

nits:
- correct name of a field in `AntiforgerySerializationContext`
- avoid allocations when returning an `AntiforgerySerializationContext` in (unlikely) case `Stream` is unused
- name literal `int` parameters
2016-02-17 23:17:15 -08:00
Ajay Bhargav Baaskaran c2f4bd0be5 Enabled xml doc generation 2016-02-17 12:12:44 -08:00
ryanbrandenburg a8dbf6a255 * Add logging for other IAntiforgery public methods 2016-02-17 11:57:50 -08:00
Ajay Bhargav Baaskaran 220479c1a1 [Fixes #30] Updated UID generation in DefaultClaimUidExtractor 2016-02-16 10:14:52 -08:00
Ryan Nowak ac107b5371 Make IsRequestValid check HTTP method
This code was popping up everywhere this method is called. Seems bad to
duplicate it. Really what the caller wants to know is 'is the request
valid or a potential CSRF exploit?'. This gets the API closer to that.
2016-02-12 16:52:25 -08:00
Kiran Challa 668b67170f Enable tests to run in donet xunit runner 2016-02-09 21:50:19 -08:00
Doug Bunting c85badcf71 Fix bad merge
- not exactly logging at the right spot in `GetAndStoreTokens()`
- test helpers were creating two separate `ServiceCollections`
 - also didn't compile!
2016-02-09 16:43:01 -08:00
Doug Bunting 73695fc443 Serialize cookie token at most once
- #23 part 3
- `Get[AndStore]Tokens()` would deserialize cookie token from request even if `IsRequestValidAsync()` already had
- `GetAndStoreTokens()` serialized an old (never saved) cookie token once and a new one twice

- refactor serialization from `DefaultAntiforgeryTokenStore` to `DefaultAntiforgery`
 - divide responsibilities and ease overall fix
- above refactoring took `IAntiforgeryContextAccessor` responsibilities along to `DefaultAntiforgery` as well
 - store all tokens in `IAntiforgeryContextAccessor` to avoid repeated (de)serializations
 - remove `AntiforgeryTokenSetInternal`

nits:
- bit more parameter renaming to `httpContext`
- remove argument checks in helper methods
 - did _not_ do a sweep through the repo; just files in this PR
2016-02-09 15:29:04 -08:00
ryanbrandenburg c8a9ecc0c1 * Add logging to Antiforgery 2016-02-09 09:27:51 -08:00
Doug Bunting 08cf13b870 Remove `ValidateTokens()` from `IAntiforgery`
- `IAntiforgery` does not expose a way to get an invalid `AntiforgeryTokenSet`
2016-02-05 12:16:10 -08:00
Ajay Bhargav Baaskaran 9445574aa1 Updated Json.Net version 2016-02-04 16:04:44 -08:00
John Luo 57dad8df8c Merge branch 'dev' of git://github.com/hishamco/Antiforgery into hdev 2016-02-04 14:59:32 -08:00
Ryan Nowak 33e3001d53 Remove GetHtml
It's being moved to MVC
2016-02-04 11:22:26 -08:00
Ryan Nowak 3a2d09b066 Move exceptions from the store to the facade
My earlier change to add TryValidateRequestAsync didn't go far enough,
because the store will still throw when the tokens aren't present. This
change is to make the store just return null tokens in these cases, and
move the exceptions to DefaultAntiforgery.
2016-02-04 11:11:45 -08:00
Doug Bunting c91f0ee667 Clean up some tests
- avoid mocking `HttpContext`
- change `DefaultAntiforgeryTest` to mock token generators consistently
2016-02-04 10:11:05 -08:00
Hisham Bin Ateya b1df299ec3 Add 'UseServer' 2016-02-04 13:37:04 +03:00