-
Notifications
You must be signed in to change notification settings - Fork 55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use pyramid.csrf independent API #230
base: master
Are you sure you want to change the base?
Conversation
* remove CSRF related code from session * use default get_csrf_token() function in templates * update CSRF validator for deform2 * use token functions directly (request.session.* -> pyramid.csrf.*)
By default Pyramid 1.10 still use `LegacySessionCSRFStoragePolicy`
Codecov Report
@@ Coverage Diff @@
## master #230 +/- ##
==========================================
- Coverage 78.64% 78.63% -0.02%
==========================================
Files 133 133
Lines 5803 5800 -3
Branches 627 626 -1
==========================================
- Hits 4564 4561 -3
Misses 997 997
Partials 242 242
Continue to review full report at Codecov.
|
Codecov Report
@@ Coverage Diff @@
## master #230 +/- ##
==========================================
- Coverage 78.64% 78.63% -0.02%
==========================================
Files 133 133
Lines 5803 5800 -3
Branches 627 626 -1
==========================================
- Hits 4564 4561 -3
Misses 997 997
Partials 242 242
Continue to review full report at Codecov.
|
re #211
SessionCSRFStoragePolicy
(store token in session)It's break some
request.session.get_csrf_token()
calls, now you must use standardget_csrf_token()
(that available in templates too). About backward compability - i don't think that it really needed, websauna is still in alfa and upgrading to new API is trivial task.TODO: update websauna.magiclogin, blog and check other apps.