Thomas Müller
d18bd17eb7
- eventsource.php: in case of potential CSRF attack we send an error message from the EventSource to the browser
...
- eventsource.js: handle undefined data on event
- update.js: in case of error we close the event source - advise the user to reload the page
- update.php: EventSource initialization is now done before we enter the maintenance mode in order to allow browser reload in case of possible CSRF attack
2013-07-11 00:27:21 +02:00
Thomas Mueller
8065c73339
fixing eventsource.js for IE8
2013-02-14 12:20:22 +01:00
Michael Gapczynski
0986b6f910
Use global oc_requesttoken for Event Source
2013-01-26 16:36:48 -05:00
Arthur Schiwon
4c707d1b1f
remove debug output
2012-11-26 14:35:02 +01:00
Arthur Schiwon
e5ad774ab0
coding style
2012-11-26 14:34:51 +01:00
Arthur Schiwon
4764876192
check whether to join url with ? or &
2012-11-26 14:34:41 +01:00
Arthur Schiwon
776be8d9f7
all but the first parameter are introduced by &
2012-11-26 14:34:28 +01:00
Lukas Reschke
393d2517ee
Change the requesttoken back to OC.EventSource.requesttoken
2012-10-31 18:43:16 +01:00
Christian Reiner
743826bbf3
Reimplementation of CSRF protection including autorefresh
2012-09-28 13:30:44 +02:00
Robin Appelman
b1010160b3
CSRF protection for eventsource
2012-07-22 16:37:49 +02:00
Robin Appelman
2f68b08491
fix eventsource for ie
2012-03-31 16:40:42 +02:00
Robin Appelman
ad495a9218
fix potential problem when using multiply eventsource's
2012-03-31 16:10:29 +02:00
Robin Appelman
fdf3df3de5
add option to send get data along with an eventsource request
2012-01-31 16:35:47 +01:00
Robin Appelman
6a1121ab2e
provide server side close option for EventStream
2012-01-30 23:19:58 +01:00
Robin Appelman
45038af948
provide small wrapper around server side events and provide a fallback for IE
2012-01-30 20:21:16 +01:00