-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Csrf hack #401
Csrf hack #401
Conversation
@@ -26,11 +27,14 @@ def get(self, request, *args, **kwargs): | |||
auth_params = { | |||
"authenticated": True, | |||
"user": serializer.data, | |||
"csrf": csrf.get_token(request), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are we sure this is secure?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should be, this value was already to be exposed to the client in a cookie. This wouldn't change the overall availability of this value from what it was before, though I'll be looking into it.
hack
Fix header typo
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is all set
This pull request changes...
List expected changes
FUNCTIONALITY
Describe the functionality
Addresses Issue #
TO TEST
List the steps to test the PR
This pull request is ready to merge when...