Tim Hess
dd7f91d717
update stylecop, fix test
2019-03-27 17:32:43 -05:00
Spring Operator
9fd8f8ea74
URL Cleanup ( #16 )
...
This commit updates URLs to prefer the https protocol. Redirects are not followed to avoid accidentally expanding intentionally shortened URLs (i.e. if using a URL shortener).
# HTTP URLs that Could Not Be Fixed
These URLs were unable to be fixed. Please review them to see if they can be manually resolved.
* [ ] http://irisclasson.com/2018/09/18/asp-net-core-openidconnect-why-is-the-claimsprincipal-name-null/ (200) with 1 occurrences could not be migrated:
([https](https://irisclasson.com/2018/09/18/asp-net-core-openidconnect-why-is-the-claimsprincipal-name-null/ ) result SSLHandshakeException).
# Fixed URLs
## Fixed But Review Recommended
These URLs were fixed, but the https status was not OK. However, the https status was the same as the http request or http redirected to an https URL, so they were migrated. Your review is recommended.
* [ ] http://network.pivotal.io/open-source (301) with 1 occurrences migrated to:
https://network.pivotal.io/open-source ([https](https://network.pivotal.io/open-source ) result ReadTimeoutException).
* [ ] http://Default_OAuthServiceUrl/oauth/authorize?response_type=code&client_id=Default_ClientId&redirect_uri=http%3A%2F%2Ffoo.bar%2Fredirect&scope= (UnknownHostException) with 1 occurrences migrated to:
https://Default_OAuthServiceUrl/oauth/authorize?response_type=code&client_id=Default_ClientId&redirect_uri=http%3A%2F%2Ffoo.bar%2Fredirect&scope= ([https](https://Default_OAuthServiceUrl/oauth/authorize?response_type=code&client_id=Default_ClientId&redirect_uri=http%3A%2F%2Ffoo.bar%2Fredirect&scope= ) result UnknownHostException).
* [ ] http://foo.bar (UnknownHostException) with 6 occurrences migrated to:
https://foo.bar ([https](https://foo.bar ) result UnknownHostException).
* [ ] http://foo.bar.com/keyurl (UnknownHostException) with 1 occurrences migrated to:
https://foo.bar.com/keyurl ([https](https://foo.bar.com/keyurl ) result UnknownHostException).
* [ ] http://foo.bar/redirect (UnknownHostException) with 1 occurrences migrated to:
https://foo.bar/redirect ([https](https://foo.bar/redirect ) result UnknownHostException).
## Fixed Success
These URLs were switched to an https URL with a 2xx status. While the status was successful, your review is still recommended.
* [ ] http://redis.io/ with 1 occurrences migrated to:
https://redis.io/ ([https](https://redis.io/ ) result 200).
* [ ] http://redis.io/documentation with 1 occurrences migrated to:
https://redis.io/documentation ([https](https://redis.io/documentation ) result 200).
* [ ] http://redis.io/topics/license with 1 occurrences migrated to:
https://redis.io/topics/license ([https](https://redis.io/topics/license ) result 200).
* [ ] http://aspnetwebstack.codeplex.com/wikipage?title=Contributors with 1 occurrences migrated to:
https://aspnetwebstack.codeplex.com/wikipage?title=Contributors ([https](https://aspnetwebstack.codeplex.com/wikipage?title=Contributors ) result 301).
# Ignored
These URLs were intentionally ignored.
* http://credhubServer/api/ with 1 occurrences
* http://default_oauthserviceurl/oauth/authorize with 1 occurrences
* http://domain with 11 occurrences
* http://localhost with 8 occurrences
* http://localhost/ with 6 occurrences
* http://localhost/signin-oidc with 1 occurrences
* http://localhost/tokenUrl with 7 occurrences
* http://localhost:81 with 2 occurrences
* http://localhost:82 with 2 occurrences
* http://redirectUri with 1 occurrences
* http://uaa-server with 1 occurrences
* http://uaa-server/oauth/token with 2 occurrences
2019-03-27 14:05:22 -05:00
Spring Operator
360f9af26a
URL Cleanup ( #13 )
...
This commit updates URLs to prefer the https protocol. Redirects are not followed to avoid accidentally expanding intentionally shortened URLs (i.e. if using a URL shortener).
# Fixed URLs
## Fixed Success
These URLs were switched to an https URL with a 2xx status. While the status was successful, your review is still recommended.
* [ ] http://www.apache.org/licenses/ with 3 occurrences migrated to:
https://www.apache.org/licenses/ ([https](https://www.apache.org/licenses/ ) result 200).
* [ ] http://www.apache.org/licenses/LICENSE-2.0 with 185 occurrences migrated to:
https://www.apache.org/licenses/LICENSE-2.0 ([https](https://www.apache.org/licenses/LICENSE-2.0 ) result 200).
2019-03-27 13:58:33 -05:00
Tim Hess
df6b28a7f2
Add Sourcelink, x-plat compilation [ #158000056 , #163396106 ]
2019-03-14 18:06:44 -05:00
Tim Hess
23597d2056
fix tests
2019-01-24 12:06:12 -06:00
Tim Hess
71786ae4bf
BackChannelHandler is always null for full framework, not the other way around
2019-01-22 20:27:54 -06:00
Tim Hess
a9e3fd69c9
fix tests for net461, bring netcoreapp2.2 back
2019-01-22 20:24:09 -06:00
Tim Hess
c6349473fc
drop netcoreapp2.2 from tests (possibly causing version conflict issues on build server)
2019-01-22 20:10:14 -06:00
Tim Hess
ffccc2ae39
Add support for using OpenIdConnect with SSO in AspNetCore #8
...
Add some comments for public extension methods [#152178914 ]
2019-01-22 19:49:28 -06:00
Tim Hess
25f17f498e
Refactor common auth components to new Base library, enable HttpClien… ( #9 )
...
* Refactor common auth components to new Base library, enable HttpClient injection or more static usage, add Tests for WCF & OWIN #5 [#154972918 , #158446551 ]
* cleaner separation of client_credentials and authorization_code flows, connect more dots with new params (logging, httpclient, etc)
* Use the redirectUri when exchanging code for token
* Move towards only having one CloudFoundryTokenKeyResolver
2019-01-17 12:09:23 -06:00
Tim Hess
b4c65b0ca6
Update VCAP_SERVICES directly when interpolating credentials #6 [delivers #159610087 ]
2018-08-10 09:47:07 -05:00
Dave Tillman
13ec7d6413
Update refs, ANC 2.0, Extensions 2.0, etc.
2018-07-26 17:03:45 -06:00
Tim Hess
edc961c98b
Define UAA credential fields as Client Id and Secret for clarity,
...
Remove mTLS auth with CredHub (target netstandard2.0 as a bonus)
[Delivers #157010071 ]
2018-05-25 14:51:48 -05:00
Tim Hess
961348bd1f
Ensure dotnet sdk 2.1.300-rc1 is installed, target netcoreapp2.1 in tests [ #157514780 ]
2018-05-16 14:17:42 -05:00
Tim Hess
2e218a0686
fix password generation parameter serialization, swap overwrite boolean for mode enum, more xml docs, allow setting permissons on user generation request
2018-02-06 11:11:45 -06:00
Tim Hess
1c1d2988db
add AdditionalPermissions params to Credential Generate requests
2018-02-05 15:30:22 -06:00
Dave Tillman
2a6b0a7788
Stylecop changes, CredHub changed to CredhubBase
2018-01-04 09:25:45 -07:00
Tim Hess
cc8734382c
logging, bug fixes, more error handling, better Windows Server compatibility
2018-01-03 07:42:47 -06:00
Tim Hess
e1371640bb
Add CredHub support [ #152801134 , #146930977 , #153714291 ]
2017-12-18 10:04:06 -06:00
Dave Tillman
c5af0cd93d
Add Stylecop
2017-12-15 11:53:26 -07:00
Dave Tillman
0cddfe3653
Change nuget names to Core
2017-10-29 12:46:38 -06:00
Dave Tillman
0560ceb8ac
Initial checkin Asp.NET Core 2.0 support
2017-10-29 09:59:50 -06:00
Dave Tillman
6bfccd11d4
Fix unit test on net461
2017-08-19 06:22:29 -06:00
Dave Tillman
1613283f95
Update tests to .net core 2.0
2017-08-19 06:07:40 -06:00
Dave Tillman
903e8f3da3
Update dependendencies
2017-08-17 05:53:48 -06:00
Dave Tillman
826e7c8b6a
Update scripts and projects
2017-06-21 09:59:04 -06:00
Dave Tillman
3272e883fe
Update to 1.1.0 and latest xunit runner
2017-06-04 09:38:29 -06:00
Dave Tillman
9cc0f6f6fd
Move back to net452
2017-04-27 16:20:30 -06:00
Dave Tillman
628639b858
VS2017 updates
2017-04-21 13:14:53 -06:00
Dave Tillman
63f36dd39e
Change to .csproj
2017-04-21 05:58:41 -06:00
Dave Tillman
538dd4b560
Bump to 1.0.1
2017-04-05 12:24:33 -06:00
Dave Tillman
bccb94229b
Updates for 1.1
2016-11-29 15:02:11 -07:00
Dave Tillman
616f9b7429
Initial checkin Redis based DataProtection keystore
2016-10-18 14:26:56 -06:00
Dave Tillman
a6cec316ba
rename SteelToe
2016-10-18 14:06:46 -06:00
Dave Tillman
be02f81f89
SteelToe -> Steeltoe
2016-09-21 13:24:19 -06:00
Dave Tillman
797576fc77
Add lifetime unit test
2016-09-12 11:04:47 -06:00
Dave Tillman
be5cb41632
Initial checkin of Jwt Bearer token support
2016-09-12 09:16:09 -06:00
Dave Tillman
46aeb2436a
Add service collection extension method and use cookies
2016-09-09 11:10:50 -06:00
Dave Tillman
6ea877a324
Fix GetBackChannelHandlertest
2016-09-02 12:27:55 -06:00
Dave Tillman
2a665ce05b
Initial checkin
2016-09-02 09:26:26 -06:00