- Aug 19, 2011
-
-
Lloyd Hilaiel authored
move secrets.js up to the libs/ dir. it's useful that all code that uses random strings routes through the same abstraction so that we can later improve a single function. a central location makes this (more) obvious.
-
Lloyd Hilaiel authored
add a 'fake verification' mechanism that can be enabled for testing via an environment variable, and will return secrets via the wsapi. add plenty of checks to ensure this never makes it into production.
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
sketch a general WSAPI client library with support for multiple simultaneous connections, port include_only onto it
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
(load gen) document the network transactions that occur during the 'reauth' activity, which simulates a user with an active browserid session using browserid to log into a site
-
Lloyd Hilaiel authored
(load gen) document the network transactions that occur during the 'user signin' activity, which simulates a user re-authenticating to browserid
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
(load generation tool) implement the 'include only' activity, which simulates an RP including include.js
-
Lloyd Hilaiel authored
(load generation tool) complete main run harness, including regulation of the number and type of activities to run, and the output of current active users being simulated
-
Lloyd Hilaiel authored
initial implementation of structure of load generator, including encoding probabalistic launching of activities
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
- Aug 18, 2011
-
-
Lloyd Hilaiel authored
lazy fetch csrf tokens in dialog immediately before a post request which requires them. fixes csrf race condition in beta and dev
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Shane Tomlinson authored
No need to JSON.stringify the emails list.
-
Shane Tomlinson authored
-
Lloyd Hilaiel authored
-
Shane Tomlinson authored
Fixing withCSRF to correctly get the CSRF token.
-
Lloyd Hilaiel authored
-
Shane Tomlinson authored
The request was assuming XML, which caused jQuery to blow its top since the response was not valid XML. If we set the response to HTML, we can set the CSRF token directly from the response, without using response.body. issue #177
-
Shane Tomlinson authored
-
Shane Tomlinson authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
fix manage page, now we explicitly call /wsapi/csrf so that the page itself can be cached. issue #74
-
Lloyd Hilaiel authored
move /csrf to /wsapi/csrf. add /wsapi path to cookies, as all other requests should have aggressive cache headers. Only create a csrf token when the client asks for it. issue #173
-
Lloyd Hilaiel authored
add logging to CSRF token generation, and rather than throwing an exception when a mismatch is detected, log an error and return a bad request to the client (seems like a better fit than 'not authorized'). issue #173
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
remove dead code. we moved from cookie-sessions to connect-cookie-sessions. we shouldn't have references to the former, and the latter does not throw exceptions when invalid cookies are encountered, so we don't need exception handling there.
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-