Commit Graph

7 Commits (Rick-Anderson-patch-11)

Author SHA1 Message Date
Wade Pickett 11428ec020
SignalR Security: Updating code sample v6-8 (#30517)
* SignalR Security: Updating code samples v6-8

* Removed .min ref for jquery
2023-09-29 14:00:33 -07:00
Wade Pickett 9836c129ea
Version by include prep for SignalR Security (#30513)
* Version by include prep for SignalR Security
2023-09-27 22:08:13 -07:00
Michal Mrnuštík 383b0f5c3e
Replace status code with status code enum (#22116)
* Replace all hardcoded status codes with System.Net.HttpStatusCode

* Replace all StatusCodes references to HttpStatusCode

Co-authored-by: Michal Mrnuštík <michal.mrnustik@riganti.cz>
2021-04-23 10:14:47 -10:00
Luke Latham 63d40f5602
SignalR naming consistency (#18759) 2020-06-12 15:55:07 -05:00
Tom Dykstra eb67d3a497
http --> https in sample URLs in SignalR security.md (#9500) 2018-11-07 09:27:17 -08:00
Andrew Stanton-Nurse eb84aae5e4 Fix status code for WebSocket origin validation (#9250) 2018-10-26 11:47:35 -05:00
Rick Anderson 36e2502ce8
UE edit of Security considerations in ASP.NET Core SignalR (#9088)
[Internal review URL](https://review.docs.microsoft.com/en-us/aspnet/core/signalr/security?view=aspnetcore-2.1&branch=pr-en-us-9088)

- Kill long sentences. Long sentences are difficult for native speakers and impossible for MT (machine translation)
- Format code to prevent horizontal scroll bar on tablets 85 characters wide. You can simulate tablets by viewing in a browser of the maximum width that doesn't have left or right panes (TOC's).
- Prune dead wood. Avoid unnecessary words that don't add meaning to the text.
- Avoid "you" except when it make the statement more clear. 

  - For example, the following CORS policy allows a SignalR browser client hosted on `http://example.com` to access **your** SignalR app:
  -For example, the following CORS policy allows a SignalR browser client hosted on `http://example.com` to access the SignalR app hosted on `http://signalr.example.com`:
- Avoid Wikipedia links
- Code snippets

Explicit sign-off required on my security rewording below:
- [ ]  Allow cross-origin requests only from domains you trust or control. 

The following are slightly too long but I couldn't find an elegant way to shorten them (not that my other trimming was elegant):

- Applications should be configured to validate these headers to ensure that only WebSockets coming from the expected origins are allowed.
2018-10-19 09:10:45 -10:00