summaryrefslogtreecommitdiff
path: root/docs/whatsnew-1.7.rst
diff options
context:
space:
mode:
authorMichael Merickel <michael@merickel.org>2016-04-16 15:32:11 -0500
committerMichael Merickel <michael@merickel.org>2016-04-16 15:32:11 -0500
commit8ceb14f9fe014fd18a12ec3f3da7099cbed15c28 (patch)
tree5623d5a833e5768d7d75b18409f2a928e8a28b6d /docs/whatsnew-1.7.rst
parentdd45cf8171c0ab08afa7529a3841c67c1fc01a02 (diff)
downloadpyramid-8ceb14f9fe014fd18a12ec3f3da7099cbed15c28.tar.gz
pyramid-8ceb14f9fe014fd18a12ec3f3da7099cbed15c28.tar.bz2
pyramid-8ceb14f9fe014fd18a12ec3f3da7099cbed15c28.zip
add docs and backward incompatibility notices for #2501
Diffstat (limited to 'docs/whatsnew-1.7.rst')
-rw-r--r--docs/whatsnew-1.7.rst20
1 files changed, 20 insertions, 0 deletions
diff --git a/docs/whatsnew-1.7.rst b/docs/whatsnew-1.7.rst
index a6d49673c..fd144a24a 100644
--- a/docs/whatsnew-1.7.rst
+++ b/docs/whatsnew-1.7.rst
@@ -28,6 +28,10 @@ Backwards Incompatibilities
https://github.com/Pylons/pyramid/issues/2368 and
https://github.com/Pylons/pyramid/pull/2256
+- The :func:`pyramid.session.check_csrf_token` function no longer validates a
+ csrf token in the query string of a request. Only headers and request bodies
+ are supported. See https://github.com/Pylons/pyramid/pull/2500
+
Feature Additions
-----------------
@@ -56,6 +60,22 @@ Feature Additions
https://github.com/Pylons/pyramid/pull/2413 and
https://github.com/Pylons/pyramid/pull/2500
+- Added an additional CSRF validation that checks the origin/referrer of a
+ request and makes sure it matches the current ``request.domain``. This
+ particular check is only active when accessing a site over HTTPS as otherwise
+ browsers don't always send the required information. If this additional CSRF
+ validation fails a ``BadCSRFOrigin`` exception will be raised and may be
+ caught by exception views (the default response is ``400 Bad Request``).
+ Additional allowed origins may be configured by setting
+ ``pyramid.csrf_trusted_origins`` to a list of domain names (with ports if on
+ a non standard port) to allow. Subdomains are not allowed unless the domain
+ name has been prefixed with a ``.``. See
+ https://github.com/Pylons/pyramid/pull/2501
+
+- Added a new :func:`pyramid.session.check_csrf_origin` API for validating the
+ origin or referrer headers against the request's domain.
+ See https://github.com/Pylons/pyramid/pull/2501
+
- Subclasses of :class:`pyramid.httpexceptions.HTTPException` will now take
into account the best match for the clients ``Accept`` header, and depending
on what is requested will return ``text/html``, ``application/json`` or