Skip to content

Tornado stable#98

Closed
christarnowski wants to merge 6 commits intosocketio:masterfrom
christarnowski:tornado-stable
Closed

Tornado stable#98
christarnowski wants to merge 6 commits intosocketio:masterfrom
christarnowski:tornado-stable

Conversation

@christarnowski
Copy link

Hello!

You might want to consider including the proposed changes. They enable Socket.IO to work with Tornado and its XSRF protection enabled.

Cheers,
Krzysztof.

Krzysztof Tarnowski added 6 commits March 6, 2011 21:28
@rauchg
Copy link
Contributor

rauchg commented Mar 7, 2011

Unfortunately this does not belong here. Otherwise we'd have to support every CSRF mechanism for every framework. Try to disable it at Tornado level.

@christarnowski
Copy link
Author

Right, I've focused solely on Tornado framework.

The CSRF mechanism is there for a reason and disabling it might not be a valid option. It would be great if Socket.IO could provide some sort of extensions/plugins mechanism, especially where HTTP headers or POST methods are involved. Not sure, though, how many people would actually use such a feature...

On a side note, the indentation is messed up in some Socket.IO files. Would be good for the project to get it right ;-)

Cheers,
Krzysztof.

@rauchg
Copy link
Contributor

rauchg commented Mar 7, 2011

How would a third party host be able to guess the URL with the session id to POST to ?

@rauchg
Copy link
Contributor

rauchg commented Mar 7, 2011

Also, indentation will be fixed, it's an open ticket :)

@christarnowski
Copy link
Author

Sweet :-) Overall, Socket.IO is really good, keep it up :-)

Re. the CSRF, it's not a matter of guessing. There are tools (worms) and techniques for making it happen.

This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants