Skip to content

Static Files

Static file serving configuration with authorization and content parsing support.

Overview

json
{
  "StaticFiles": {
    "Enabled": false,
    "RootPath": "wwwroot",
    "AuthorizePaths": [],
    "UnauthorizedRedirectPath": "/",
    "UnauthorizedReturnToQueryParameter": "return_to",
    "ParseContentOptions": {
      "Enabled": false,
      "AvailableClaims": [],
      "CacheParsedFile": true,
      "Headers": [
        "Cache-Control: no-store, no-cache, must-revalidate",
        "Pragma: no-cache",
        "Expires: 0"
      ],
      "FilePaths": ["*.html"],
      "AntiforgeryFieldName": "antiForgeryFieldName",
      "AntiforgeryToken": "antiForgeryToken"
    }
  }
}

Settings Reference

SettingTypeDefaultDescription
EnabledboolfalseEnable static file serving.
RootPathstring"wwwroot"Root directory for static files.
AuthorizePathsarray[]File patterns requiring authorization.
UnauthorizedRedirectPathstring"/"Redirect path for unauthorized requests.
UnauthorizedReturnToQueryParameterstring"return_to"Query parameter name for return URL after authentication.
ParseContentOptionsobject(see below)Content parsing configuration.

Authorization

Protect specific static files by requiring authentication:

json
{
  "StaticFiles": {
    "Enabled": true,
    "AuthorizePaths": [
      "/admin/*",
      "/dashboard/*.html",
      "/reports/*"
    ],
    "UnauthorizedRedirectPath": "/login",
    "UnauthorizedReturnToQueryParameter": "return_to"
  }
}

Path Patterns

File paths are relative to RootPath and pattern matching is case-insensitive:

PatternDescription
*.htmlAll HTML files in any directory
/admin/*All files in the admin directory
/user/profile.htmlSpecific file
*.jsAll JavaScript files

Content Parsing

Parse static files and replace tags with claim values from authenticated users.

json
{
  "StaticFiles": {
    "ParseContentOptions": {
      "Enabled": false,
      "AvailableClaims": [],
      "CacheParsedFile": true,
      "Headers": [
        "Cache-Control: no-store, no-cache, must-revalidate",
        "Pragma: no-cache",
        "Expires: 0"
      ],
      "FilePaths": ["*.html"],
      "AntiforgeryFieldName": "antiForgeryFieldName",
      "AntiforgeryToken": "antiForgeryToken"
    }
  }
}

Parse Content Settings Reference

SettingTypeDefaultDescription
EnabledboolfalseEnable content parsing for static files.
AvailableClaimsarray[]Claim types to parse. Replaced with NULL if not found or user is unauthenticated.
CacheParsedFilebooltrueCache parsed file templates in memory. Caching applies to templates before parsing, not final content.
Headersarray(see below)Response headers for parsed static files. Set to null or empty array to ignore.
FilePathsarray["*.html"]File patterns to parse.
AntiforgeryFieldNamestring"antiForgeryFieldName"Variable name for the antiforgery form field name in templates.
AntiforgeryTokenstring"antiForgeryToken"Variable name for the antiforgery token value in templates.

Tag Replacement

When Enabled is true, tags in the format {claimType} are replaced with values from the user's claims:

html
<p>Welcome, {name}!</p>
<p>Your email: {email}</p>
<input type="hidden" name="{antiForgeryFieldName}" value="{antiForgeryToken}" />

For unauthenticated users or missing claims, values are replaced with NULL.

Default Headers

The default headers disable caching for parsed content:

Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Expires: 0

Example Configuration

Serve static files with protected admin area and content parsing:

json
{
  "StaticFiles": {
    "Enabled": true,
    "RootPath": "wwwroot",
    "AuthorizePaths": [
      "/admin/*",
      "/dashboard/*"
    ],
    "UnauthorizedRedirectPath": "/login.html",
    "UnauthorizedReturnToQueryParameter": "return_to",
    "ParseContentOptions": {
      "Enabled": true,
      "AvailableClaims": ["name", "email", "role"],
      "CacheParsedFile": true,
      "FilePaths": ["*.html", "*.htm"],
      "AntiforgeryFieldName": "antiForgeryFieldName",
      "AntiforgeryToken": "antiForgeryToken"
    }
  }
}

Next Steps

Released under the MIT License.