diff options
| author | Michael Merickel <michael@merickel.org> | 2019-10-22 22:05:27 -0500 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2019-10-22 22:05:27 -0500 |
| commit | 4a46827769bbe181070a74927aa4e988a4cc3112 (patch) | |
| tree | 1b7de5c2b62928aea23372adb2b95b42aa5eab0c /docs | |
| parent | 2153b4b878d77aa0cb5b79805dd185d133c26451 (diff) | |
| parent | 8b7b7cbf9058312f0bf6b044cfa388f807eff739 (diff) | |
| download | pyramid-4a46827769bbe181070a74927aa4e988a4cc3112.tar.gz pyramid-4a46827769bbe181070a74927aa4e988a4cc3112.tar.bz2 pyramid-4a46827769bbe181070a74927aa4e988a4cc3112.zip | |
Merge pull request #3518 from mmerickel/default-allow-no-origin
add check_origin option and support an origin of null
Diffstat (limited to 'docs')
| -rw-r--r-- | docs/narr/security.rst | 7 |
1 files changed, 6 insertions, 1 deletions
diff --git a/docs/narr/security.rst b/docs/narr/security.rst index 9d45dfb6a..f1bb37c69 100644 --- a/docs/narr/security.rst +++ b/docs/narr/security.rst @@ -885,7 +885,12 @@ is the current host, however additional origins may be configured by setting are non-standard). If a host in the list of domains starts with a ``.`` then that will allow all subdomains as well as the domain without the ``.``. If no ``Referer`` or ``Origin`` header is present in an HTTPS request, the CSRF check -will fail unless ``allow_no_origin`` is set. +will fail unless ``allow_no_origin`` is set. The special ``Origin: null`` can +be allowed by adding ``null`` to the ``pyramid.csrf_trusted_origins`` list. + +It is possible to opt out of checking the origin by passing +``check_origin=False``. This is useful if the :term:`CSRF storage policy` is +known to be secure such that the token cannot be easily used by an attacker. If CSRF checks fail then a :class:`pyramid.exceptions.BadCSRFToken` or :class:`pyramid.exceptions.BadCSRFOrigin` exception will be raised. This |
