Author: [email protected]
Date: Tue Jul 14 09:00:22 2009
New Revision: 5731

Modified:
    trunk/user/src/com/google/gwt/user/server/rpc/RemoteServiceServlet.java

Log:
Remove check for strong name header as part of  
RemoteServiceServlet.processCall() due to reports of this triggering on  
assumed-valid clients.
Will review derpc code based on further review.

Patch by: bobv
Review by: jgw (TBR)

Modified:  
trunk/user/src/com/google/gwt/user/server/rpc/RemoteServiceServlet.java
==============================================================================
--- trunk/user/src/com/google/gwt/user/server/rpc/RemoteServiceServlet.java     
 
(original)
+++ trunk/user/src/com/google/gwt/user/server/rpc/RemoteServiceServlet.java     
 
Tue Jul 14 09:00:22 2009
@@ -183,10 +183,6 @@
     */
    public String processCall(String payload) throws SerializationException {
      try {
-      if (getPermutationStrongName() == null) {
-        throw new SecurityException(
-            "Blocked request with GWT permutation header (XSRF attack?)");
-      }
        RPCRequest rpcRequest = RPC.decodeRequest(payload, this.getClass(),  
this);
        onAfterRequestDeserialized(rpcRequest);
        return RPC.invokeAndEncodeResponse(this, rpcRequest.getMethod(),

--~--~---------~--~----~------------~-------~--~----~
http://groups.google.com/group/Google-Web-Toolkit-Contributors
-~----------~----~----~----~------~----~------~--~---

Reply via email to