summaryrefslogtreecommitdiffstats
path: root/nuget/content
diff options
context:
space:
mode:
authorAndrew Arnott <andrewarnott@gmail.com>2012-01-29 10:18:06 -0800
committerAndrew Arnott <andrewarnott@gmail.com>2012-01-29 10:38:33 -0800
commitcf2ac40a21df5c561f8ee7f65c56ce8d62d2123d (patch)
tree7b306a52153b3c0f84cf0bdd481a7646f4c4fc46 /nuget/content
parent94d3bb7d936246c05a9f6b48481832a30fdbcca2 (diff)
downloadDotNetOpenAuth-cf2ac40a21df5c561f8ee7f65c56ce8d62d2123d.zip
DotNetOpenAuth-cf2ac40a21df5c561f8ee7f65c56ce8d62d2123d.tar.gz
DotNetOpenAuth-cf2ac40a21df5c561f8ee7f65c56ce8d62d2123d.tar.bz2
Fixed up all existing NuGet packages and added several more. All but UI dll's are now packaged in NuGet.
Diffstat (limited to 'nuget/content')
-rw-r--r--nuget/content/Core/web.config.transform36
-rw-r--r--nuget/content/OAuth.Core/web.config.transform7
-rw-r--r--nuget/content/OpenId.Core/web.config.transform35
-rw-r--r--nuget/content/OpenId.Provider/web.config.transform8
-rw-r--r--nuget/content/OpenId.RelyingParty/web.config.transform19
-rw-r--r--nuget/content/Ultimate/web.config.transform (renamed from nuget/content/web.config.transform)2
6 files changed, 106 insertions, 1 deletions
diff --git a/nuget/content/Core/web.config.transform b/nuget/content/Core/web.config.transform
new file mode 100644
index 0000000..57a4692
--- /dev/null
+++ b/nuget/content/Core/web.config.transform
@@ -0,0 +1,36 @@
+<configuration>
+ <configSections>
+ <sectionGroup name="dotNetOpenAuth" type="DotNetOpenAuth.Configuration.DotNetOpenAuthSection, DotNetOpenAuth.Core">
+ <section name="messaging" type="DotNetOpenAuth.Configuration.MessagingElement, DotNetOpenAuth.Core" requirePermission="false" allowLocation="true" />
+ <section name="reporting" type="DotNetOpenAuth.Configuration.ReportingElement, DotNetOpenAuth.Core" requirePermission="false" allowLocation="true" />
+ </sectionGroup>
+ </configSections>
+
+ <system.net>
+ <defaultProxy enabled="true" />
+ <settings>
+ <!-- This setting causes .NET to check certificate revocation lists (CRL)
+ before trusting HTTPS certificates. But this setting tends to not
+ be allowed in shared hosting environments. -->
+ <!--<servicePointManager checkCertificateRevocationList="true"/>-->
+ </settings>
+ </system.net>
+
+ <runtime>
+ <!-- This prevents the Windows Event Log from frequently logging that HMAC1 is being used (when the other party needs it). -->
+ <legacyHMACWarning enabled="0" />
+ </runtime>
+
+ <dotNetOpenAuth>
+ <messaging>
+ <untrustedWebRequest>
+ <whitelistHosts>
+ <!-- Uncomment to enable communication with localhost (should generally not activate in production!) -->
+ <!--<add name="localhost" />-->
+ </whitelistHosts>
+ </untrustedWebRequest>
+ </messaging>
+ <!-- Allow DotNetOpenAuth to publish usage statistics to library authors to improve the library. -->
+ <reporting enabled="true" />
+ </dotNetOpenAuth>
+</configuration> \ No newline at end of file
diff --git a/nuget/content/OAuth.Core/web.config.transform b/nuget/content/OAuth.Core/web.config.transform
new file mode 100644
index 0000000..d9b5d92
--- /dev/null
+++ b/nuget/content/OAuth.Core/web.config.transform
@@ -0,0 +1,7 @@
+<configuration>
+ <configSections>
+ <sectionGroup name="dotNetOpenAuth" type="DotNetOpenAuth.Configuration.DotNetOpenAuthSection, DotNetOpenAuth.Core">
+ <section name="oauth" type="DotNetOpenAuth.Configuration.OAuthElement, DotNetOpenAuth.OAuth" requirePermission="false" allowLocation="true" />
+ </sectionGroup>
+ </configSections>
+</configuration> \ No newline at end of file
diff --git a/nuget/content/OpenId.Core/web.config.transform b/nuget/content/OpenId.Core/web.config.transform
new file mode 100644
index 0000000..0771d2c
--- /dev/null
+++ b/nuget/content/OpenId.Core/web.config.transform
@@ -0,0 +1,35 @@
+<configuration>
+ <configSections>
+ <section name="uri" type="System.Configuration.UriSection, System, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />
+ <sectionGroup name="dotNetOpenAuth" type="DotNetOpenAuth.Configuration.DotNetOpenAuthSection, DotNetOpenAuth.Core">
+ <section name="openid" type="DotNetOpenAuth.Configuration.OpenIdElement, DotNetOpenAuth.OpenId" requirePermission="false" allowLocation="true" />
+ </sectionGroup>
+ </configSections>
+
+ <uri>
+ <!-- The uri section is necessary to turn on .NET 3.5 support for IDN (international domain names),
+ which is necessary for OpenID urls with unicode characters in the domain/host name.
+ It is also required to put the Uri class into RFC 3986 escaping mode, which OpenID and OAuth require. -->
+ <idn enabled="All"/>
+ <iriParsing enabled="true"/>
+ </uri>
+
+ <runtime>
+ <!-- When targeting ASP.NET MVC 2, this assemblyBinding makes MVC 1 references relink
+ to MVC 2 so libraries such as DotNetOpenAuth that compile against MVC 1 will work with it. -->
+ <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">
+ <dependentAssembly>
+ <assemblyIdentity name="System.Web.Mvc" publicKeyToken="31bf3856ad364e35" />
+ <bindingRedirect oldVersion="1.0.0.0" newVersion="2.0.0.0" />
+ </dependentAssembly>
+ </assemblyBinding>
+ </runtime>
+
+ <dotNetOpenAuth>
+ <!-- This is an optional configuration section where aspects of dotnetopenauth can be customized. -->
+ <!-- For a complete set of configuration options see http://www.dotnetopenauth.net/developers/code-snippets/configuration-options/ -->
+ <!-- You may also refer to README.Bin.html for instructions on enabling Intellisense for this section. -->
+ <openid>
+ </openid>
+ </dotNetOpenAuth>
+</configuration> \ No newline at end of file
diff --git a/nuget/content/OpenId.Provider/web.config.transform b/nuget/content/OpenId.Provider/web.config.transform
new file mode 100644
index 0000000..8365a3a
--- /dev/null
+++ b/nuget/content/OpenId.Provider/web.config.transform
@@ -0,0 +1,8 @@
+<configuration>
+ <dotNetOpenAuth>
+ <openid>
+ <provider>
+ </provider>
+ </openid>
+ </dotNetOpenAuth>
+</configuration> \ No newline at end of file
diff --git a/nuget/content/OpenId.RelyingParty/web.config.transform b/nuget/content/OpenId.RelyingParty/web.config.transform
new file mode 100644
index 0000000..c9adf3f
--- /dev/null
+++ b/nuget/content/OpenId.RelyingParty/web.config.transform
@@ -0,0 +1,19 @@
+<configuration>
+ <dotNetOpenAuth>
+ <openid>
+ <relyingParty>
+ <security requireSsl="false">
+ <!-- Uncomment the trustedProviders tag if your relying party should only accept positive assertions from a closed set of OpenID Providers. -->
+ <!--<trustedProviders rejectAssertionsFromUntrustedProviders="true">
+ <add endpoint="https://www.google.com/accounts/o8/ud" />
+ </trustedProviders>-->
+ </security>
+ <behaviors>
+ <!-- The following OPTIONAL behavior allows RPs to use SREG only, but be compatible
+ with OPs that use Attribute Exchange (in various formats). -->
+ <add type="DotNetOpenAuth.OpenId.RelyingParty.Behaviors.AXFetchAsSregTransform, DotNetOpenAuth.OpenId.RelyingParty" />
+ </behaviors>
+ </relyingParty>
+ </openid>
+ </dotNetOpenAuth>
+</configuration> \ No newline at end of file
diff --git a/nuget/content/web.config.transform b/nuget/content/Ultimate/web.config.transform
index b7d5c84..9cd76ed 100644
--- a/nuget/content/web.config.transform
+++ b/nuget/content/Ultimate/web.config.transform
@@ -56,7 +56,7 @@
<behaviors>
<!-- The following OPTIONAL behavior allows RPs to use SREG only, but be compatible
with OPs that use Attribute Exchange (in various formats). -->
- <add type="DotNetOpenAuth.OpenId.Behaviors.AXFetchAsSregRelyingPartyTransform, DotNetOpenAuth" />
+ <add type="DotNetOpenAuth.OpenId.RelyingParty.Behaviors.AXFetchAsSregTransform, DotNetOpenAuth" />
</behaviors>
</relyingParty>
</openid>