summaryrefslogtreecommitdiff
path: root/docs/narr/security.rst
diff options
context:
space:
mode:
authorMichael Merickel <michael@merickel.org>2017-04-29 01:43:38 -0500
committerMichael Merickel <michael@merickel.org>2017-04-29 02:04:58 -0500
commit682a9b9df6f42f8261daa077f04b47b65bf00c34 (patch)
tree54232513a60d4c94b21221280e9138f7a2219485 /docs/narr/security.rst
parent4b3603ad2f4850605c45e1b7bf4f077584303641 (diff)
downloadpyramid-682a9b9df6f42f8261daa077f04b47b65bf00c34.tar.gz
pyramid-682a9b9df6f42f8261daa077f04b47b65bf00c34.tar.bz2
pyramid-682a9b9df6f42f8261daa077f04b47b65bf00c34.zip
final cleanup of csrf decoupling in #2854
- Renamed `SessionCSRFStoragePolicy` to `LegacySessionCSRFStoragePolicy` for the version that uses the legacy `ISession.get_csrf_token` and `ISession.new_csrf_token` apis and set that as the default. - Added new `SessionCSRFStoragePolicy` that stores data in the session similar to how the `SessionAuthenticationPolicy` works. - `CookieCSRFStoragePolicy` did not properly return the newly generated token from `get_csrf_token` after calling `new_csrf_token`. It needed to cache the new value since the response callback does not affect the current request. - `CookieCSRFStoragePolicy` was not forwarding the `domain` value to the `CookieProfile` causing that setting to be ignored. - Removed `check_csrf_token` from the `ICSRFStoragePolicy` interface to simplify implementations of storage policies. - Added an introspectable item for the configured storage policy so that it appears on the debugtoolbar. - Added a change note on `ISession` that it no longer required the csrf methods. - Leave deprecated shims in ``pyramid.session`` for ``check_csrf_origin`` and ``check_csrf_token``.
Diffstat (limited to 'docs/narr/security.rst')
-rw-r--r--docs/narr/security.rst1
1 files changed, 1 insertions, 0 deletions
diff --git a/docs/narr/security.rst b/docs/narr/security.rst
index 86e5c1ef4..ddf496b69 100644
--- a/docs/narr/security.rst
+++ b/docs/narr/security.rst
@@ -824,6 +824,7 @@ If no CSRF token previously existed for this user, then a new token will be set
into the session and returned. The newly created token will be opaque and
randomized.
+.. _get_csrf_token_in_templates:
Using the ``get_csrf_token`` global in templates
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~