Граф коммитов

40 Коммитов

Автор SHA1 Сообщение Дата
Tim Hess dd7f91d717 update stylecop, fix test 2019-03-27 17:32:43 -05:00
Spring Operator 9fd8f8ea74 URL Cleanup (#16)
This commit updates URLs to prefer the https protocol. Redirects are not followed to avoid accidentally expanding intentionally shortened URLs (i.e. if using a URL shortener).

# HTTP URLs that Could Not Be Fixed
These URLs were unable to be fixed. Please review them to see if they can be manually resolved.

* [ ] http://irisclasson.com/2018/09/18/asp-net-core-openidconnect-why-is-the-claimsprincipal-name-null/ (200) with 1 occurrences could not be migrated:
   ([https](https://irisclasson.com/2018/09/18/asp-net-core-openidconnect-why-is-the-claimsprincipal-name-null/) result SSLHandshakeException).

# Fixed URLs

## Fixed But Review Recommended
These URLs were fixed, but the https status was not OK. However, the https status was the same as the http request or http redirected to an https URL, so they were migrated. Your review is recommended.

* [ ] http://network.pivotal.io/open-source (301) with 1 occurrences migrated to:
  https://network.pivotal.io/open-source ([https](https://network.pivotal.io/open-source) result ReadTimeoutException).
* [ ] http://Default_OAuthServiceUrl/oauth/authorize?response_type=code&client_id=Default_ClientId&redirect_uri=http%3A%2F%2Ffoo.bar%2Fredirect&scope= (UnknownHostException) with 1 occurrences migrated to:
  https://Default_OAuthServiceUrl/oauth/authorize?response_type=code&client_id=Default_ClientId&redirect_uri=http%3A%2F%2Ffoo.bar%2Fredirect&scope= ([https](https://Default_OAuthServiceUrl/oauth/authorize?response_type=code&client_id=Default_ClientId&redirect_uri=http%3A%2F%2Ffoo.bar%2Fredirect&scope=) result UnknownHostException).
* [ ] http://foo.bar (UnknownHostException) with 6 occurrences migrated to:
  https://foo.bar ([https](https://foo.bar) result UnknownHostException).
* [ ] http://foo.bar.com/keyurl (UnknownHostException) with 1 occurrences migrated to:
  https://foo.bar.com/keyurl ([https](https://foo.bar.com/keyurl) result UnknownHostException).
* [ ] http://foo.bar/redirect (UnknownHostException) with 1 occurrences migrated to:
  https://foo.bar/redirect ([https](https://foo.bar/redirect) result UnknownHostException).

## Fixed Success
These URLs were switched to an https URL with a 2xx status. While the status was successful, your review is still recommended.

* [ ] http://redis.io/ with 1 occurrences migrated to:
  https://redis.io/ ([https](https://redis.io/) result 200).
* [ ] http://redis.io/documentation with 1 occurrences migrated to:
  https://redis.io/documentation ([https](https://redis.io/documentation) result 200).
* [ ] http://redis.io/topics/license with 1 occurrences migrated to:
  https://redis.io/topics/license ([https](https://redis.io/topics/license) result 200).
* [ ] http://aspnetwebstack.codeplex.com/wikipage?title=Contributors with 1 occurrences migrated to:
  https://aspnetwebstack.codeplex.com/wikipage?title=Contributors ([https](https://aspnetwebstack.codeplex.com/wikipage?title=Contributors) result 301).

# Ignored
These URLs were intentionally ignored.

* http://credhubServer/api/ with 1 occurrences
* http://default_oauthserviceurl/oauth/authorize with 1 occurrences
* http://domain with 11 occurrences
* http://localhost with 8 occurrences
* http://localhost/ with 6 occurrences
* http://localhost/signin-oidc with 1 occurrences
* http://localhost/tokenUrl with 7 occurrences
* http://localhost:81 with 2 occurrences
* http://localhost:82 with 2 occurrences
* http://redirectUri with 1 occurrences
* http://uaa-server with 1 occurrences
* http://uaa-server/oauth/token with 2 occurrences
2019-03-27 14:05:22 -05:00
Spring Operator 360f9af26a URL Cleanup (#13)
This commit updates URLs to prefer the https protocol. Redirects are not followed to avoid accidentally expanding intentionally shortened URLs (i.e. if using a URL shortener).

# Fixed URLs

## Fixed Success
These URLs were switched to an https URL with a 2xx status. While the status was successful, your review is still recommended.

* [ ] http://www.apache.org/licenses/ with 3 occurrences migrated to:
  https://www.apache.org/licenses/ ([https](https://www.apache.org/licenses/) result 200).
* [ ] http://www.apache.org/licenses/LICENSE-2.0 with 185 occurrences migrated to:
  https://www.apache.org/licenses/LICENSE-2.0 ([https](https://www.apache.org/licenses/LICENSE-2.0) result 200).
2019-03-27 13:58:33 -05:00
Tim Hess df6b28a7f2 Add Sourcelink, x-plat compilation [#158000056, #163396106] 2019-03-14 18:06:44 -05:00
Tim Hess 23597d2056 fix tests 2019-01-24 12:06:12 -06:00
Tim Hess 71786ae4bf BackChannelHandler is always null for full framework, not the other way around 2019-01-22 20:27:54 -06:00
Tim Hess a9e3fd69c9 fix tests for net461, bring netcoreapp2.2 back 2019-01-22 20:24:09 -06:00
Tim Hess c6349473fc drop netcoreapp2.2 from tests (possibly causing version conflict issues on build server) 2019-01-22 20:10:14 -06:00
Tim Hess ffccc2ae39 Add support for using OpenIdConnect with SSO in AspNetCore #8
Add some comments for public extension methods [#152178914]
2019-01-22 19:49:28 -06:00
Tim Hess 25f17f498e
Refactor common auth components to new Base library, enable HttpClien… (#9)
* Refactor common auth components to new Base library, enable HttpClient injection or more static usage, add Tests for WCF & OWIN #5 [#154972918, #158446551]

* cleaner separation of client_credentials and authorization_code flows, connect more dots with new params (logging, httpclient, etc)

* Use the redirectUri when exchanging code for token

* Move towards only having one CloudFoundryTokenKeyResolver
2019-01-17 12:09:23 -06:00
Tim Hess b4c65b0ca6 Update VCAP_SERVICES directly when interpolating credentials #6 [delivers #159610087] 2018-08-10 09:47:07 -05:00
Dave Tillman 13ec7d6413 Update refs, ANC 2.0, Extensions 2.0, etc. 2018-07-26 17:03:45 -06:00
Tim Hess edc961c98b Define UAA credential fields as Client Id and Secret for clarity,
Remove mTLS auth with CredHub (target netstandard2.0 as a bonus)
[Delivers #157010071]
2018-05-25 14:51:48 -05:00
Tim Hess 961348bd1f Ensure dotnet sdk 2.1.300-rc1 is installed, target netcoreapp2.1 in tests [#157514780] 2018-05-16 14:17:42 -05:00
Tim Hess 2e218a0686 fix password generation parameter serialization, swap overwrite boolean for mode enum, more xml docs, allow setting permissons on user generation request 2018-02-06 11:11:45 -06:00
Tim Hess 1c1d2988db add AdditionalPermissions params to Credential Generate requests 2018-02-05 15:30:22 -06:00
Dave Tillman 2a6b0a7788 Stylecop changes, CredHub changed to CredhubBase 2018-01-04 09:25:45 -07:00
Tim Hess cc8734382c logging, bug fixes, more error handling, better Windows Server compatibility 2018-01-03 07:42:47 -06:00
Tim Hess e1371640bb Add CredHub support [#152801134, #146930977, #153714291] 2017-12-18 10:04:06 -06:00
Dave Tillman c5af0cd93d Add Stylecop 2017-12-15 11:53:26 -07:00
Dave Tillman 0cddfe3653 Change nuget names to Core 2017-10-29 12:46:38 -06:00
Dave Tillman 0560ceb8ac Initial checkin Asp.NET Core 2.0 support 2017-10-29 09:59:50 -06:00
Dave Tillman 6bfccd11d4 Fix unit test on net461 2017-08-19 06:22:29 -06:00
Dave Tillman 1613283f95 Update tests to .net core 2.0 2017-08-19 06:07:40 -06:00
Dave Tillman 903e8f3da3 Update dependendencies 2017-08-17 05:53:48 -06:00
Dave Tillman 826e7c8b6a Update scripts and projects 2017-06-21 09:59:04 -06:00
Dave Tillman 3272e883fe Update to 1.1.0 and latest xunit runner 2017-06-04 09:38:29 -06:00
Dave Tillman 9cc0f6f6fd Move back to net452 2017-04-27 16:20:30 -06:00
Dave Tillman 628639b858 VS2017 updates 2017-04-21 13:14:53 -06:00
Dave Tillman 63f36dd39e Change to .csproj 2017-04-21 05:58:41 -06:00
Dave Tillman 538dd4b560 Bump to 1.0.1 2017-04-05 12:24:33 -06:00
Dave Tillman bccb94229b Updates for 1.1 2016-11-29 15:02:11 -07:00
Dave Tillman 616f9b7429 Initial checkin Redis based DataProtection keystore 2016-10-18 14:26:56 -06:00
Dave Tillman a6cec316ba rename SteelToe 2016-10-18 14:06:46 -06:00
Dave Tillman be02f81f89 SteelToe -> Steeltoe 2016-09-21 13:24:19 -06:00
Dave Tillman 797576fc77 Add lifetime unit test 2016-09-12 11:04:47 -06:00
Dave Tillman be5cb41632 Initial checkin of Jwt Bearer token support 2016-09-12 09:16:09 -06:00
Dave Tillman 46aeb2436a Add service collection extension method and use cookies 2016-09-09 11:10:50 -06:00
Dave Tillman 6ea877a324 Fix GetBackChannelHandlertest 2016-09-02 12:27:55 -06:00
Dave Tillman 2a665ce05b Initial checkin 2016-09-02 09:26:26 -06:00