Remember.Core icon indicating copy to clipboard operation
Remember.Core copied to clipboard

🐬 .NET Web 应用框架。remember for ASP.NET Core

Results 8 Remember.Core issues
Sort by recently updated
recently updated
newest added

Bumps [minimist](https://github.com/substack/minimist) from 1.2.5 to 1.2.6. Commits 7efb22a 1.2.6 ef88b93 security notice for additional prototype pollution issue c2b9819 isConstructorOrProto adapted from PR bc8ecee test from prototype pollution PR See full...

dependencies
javascript

Bumps [url-parse](https://github.com/unshiftio/url-parse) from 1.4.7 to 1.5.10. Commits 8cd4c6c 1.5.10 ce7a01f [fix] Improve handling of empty port 0071490 [doc] Update JSDoc comment a7044e3 [minor] Use more descriptive variable name d547792 [security]...

dependencies
javascript

Bumps [prismjs](https://github.com/PrismJS/prism) from 1.22.0 to 1.27.0. Release notes Sourced from prismjs's releases. v1.27.0 Release 1.27.0 v1.26.0 Release 1.26.0 v1.25.0 Release 1.25.0 v1.24.1 Release 1.24.1 v1.24.0 Release 1.24.0 v1.23.0 Release 1.23.0...

dependencies
javascript

Bumps [follow-redirects](https://github.com/follow-redirects/follow-redirects) from 1.13.0 to 1.14.8. Commits 3d81dc3 Release version 1.14.8 of the npm package. 62e546a Drop confidential headers across schemes. 2ede36d Release version 1.14.7 of the npm package. 8b347cb...

dependencies
javascript

Bumps [SharpZipLib](https://github.com/icsharpcode/SharpZipLib) from 1.2.0 to 1.3.3. Release notes Sourced from SharpZipLib's releases. v1.3.3 Another minor release, containing security fixes and smaller bugfixes. Fixes: 🐛 specialized tar extract traversal by nils...

dependencies
.NET

Bumps [Microsoft.AspNetCore.Authentication.JwtBearer](https://github.com/aspnet/AspNetCore) from 3.1.7 to 3.1.18. Release notes Sourced from Microsoft.AspNetCore.Authentication.JwtBearer's releases. .NET Core 3.1.18 Release .NET Core 3.1.17 Release .NET Core 3.1.16 Release .NET Core 3.1.15 Release .NET Core...

dependencies
.NET

> 资源服务器 应向 ids4 请求,验证 JWT Token 是否合法,否则如何判断此token是否是ids4颁发,而不是他人本地伪造 > 没错,JWT是可以自己本地效验,而无需ids4,但由自己签名生成的,不就可以通过效验了吗? > 此时,若是解析出 JWT Token 中的 `UserId` (sub),再利用此 `UserId` 查询 用户角色拥有的权限,岂不是很危险 > 补充:ASP.NET Core从 请求头 `Authorization` 中取出 JWT Token,再解析放到 `User.Claims` 中...

![image](https://user-images.githubusercontent.com/16939388/89736921-b0dab580-da9f-11ea-8292-25d785631737.png) ```csharp // 当前 Template.tt 所在的模板路径  // Host.Template 是当前文本模板 Template.tt 的路径 var currentPath = Path.GetDirectoryName(Host.TemplateFile); // 解决方案路径: F:\Com\me\Repos\remember\src\Libraries string solutionPath = currentPath.Replace("\\Repositories\\Auto\\Interface", ""); // 实体文件所在路径 string modelFile = Path.Combine(solutionPath, @"Domain\bin\Debug\netcoreapp3.1\Domain.dll");...