mirror of
https://github.com/actix/actix-extras.git
synced 2024-11-24 16:02:59 +01:00
fix variable name: cors -> csrf
This commit is contained in:
parent
1e5daa1de8
commit
5816ecd1bc
@ -122,7 +122,7 @@ impl CsrfFilter {
|
|||||||
/// Start building a `CsrfFilter`.
|
/// Start building a `CsrfFilter`.
|
||||||
pub fn build() -> CsrfFilterBuilder {
|
pub fn build() -> CsrfFilterBuilder {
|
||||||
CsrfFilterBuilder {
|
CsrfFilterBuilder {
|
||||||
cors: CsrfFilter {
|
csrf: CsrfFilter {
|
||||||
origins: HashSet::new(),
|
origins: HashSet::new(),
|
||||||
allow_xhr: false,
|
allow_xhr: false,
|
||||||
allow_missing_origin: false,
|
allow_missing_origin: false,
|
||||||
@ -175,14 +175,14 @@ impl<S> Middleware<S> for CsrfFilter {
|
|||||||
/// .finish();
|
/// .finish();
|
||||||
/// ```
|
/// ```
|
||||||
pub struct CsrfFilterBuilder {
|
pub struct CsrfFilterBuilder {
|
||||||
cors: CsrfFilter,
|
csrf: CsrfFilter,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl CsrfFilterBuilder {
|
impl CsrfFilterBuilder {
|
||||||
/// Add an origin that is allowed to make requests. Will be verified
|
/// Add an origin that is allowed to make requests. Will be verified
|
||||||
/// against the `Origin` request header.
|
/// against the `Origin` request header.
|
||||||
pub fn allowed_origin(mut self, origin: &str) -> CsrfFilterBuilder {
|
pub fn allowed_origin(mut self, origin: &str) -> CsrfFilterBuilder {
|
||||||
self.cors.origins.insert(origin.to_owned());
|
self.csrf.origins.insert(origin.to_owned());
|
||||||
self
|
self
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -198,7 +198,7 @@ impl CsrfFilterBuilder {
|
|||||||
///
|
///
|
||||||
/// Use this method to enable more lax filtering.
|
/// Use this method to enable more lax filtering.
|
||||||
pub fn allow_xhr(mut self) -> CsrfFilterBuilder {
|
pub fn allow_xhr(mut self) -> CsrfFilterBuilder {
|
||||||
self.cors.allow_xhr = true;
|
self.csrf.allow_xhr = true;
|
||||||
self
|
self
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -209,13 +209,13 @@ impl CsrfFilterBuilder {
|
|||||||
/// missing `Origin` headers because a cross-site attacker cannot prevent
|
/// missing `Origin` headers because a cross-site attacker cannot prevent
|
||||||
/// the browser from sending `Origin` on unsafe requests.
|
/// the browser from sending `Origin` on unsafe requests.
|
||||||
pub fn allow_missing_origin(mut self) -> CsrfFilterBuilder {
|
pub fn allow_missing_origin(mut self) -> CsrfFilterBuilder {
|
||||||
self.cors.allow_missing_origin = true;
|
self.csrf.allow_missing_origin = true;
|
||||||
self
|
self
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Finishes building the `CsrfFilter` instance.
|
/// Finishes building the `CsrfFilter` instance.
|
||||||
pub fn finish(self) -> CsrfFilter {
|
pub fn finish(self) -> CsrfFilter {
|
||||||
self.cors
|
self.csrf
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user