Skip to content
Projeler
Gruplar
Parçacıklar
Yardım
Yükleniyor...
Oturum aç / Kaydol
Gezinmeyi değiştir
D
django
Proje
Proje
Ayrıntılar
Etkinlik
Cycle Analytics
Depo (repository)
Depo (repository)
Dosyalar
Kayıtlar (commit)
Dallar (branch)
Etiketler
Katkıda bulunanlar
Grafik
Karşılaştır
Grafikler
Konular (issue)
0
Konular (issue)
0
Liste
Pano
Etiketler
Kilometre Taşları
Birleştirme (merge) Talepleri
0
Birleştirme (merge) Talepleri
0
CI / CD
CI / CD
İş akışları (pipeline)
İşler
Zamanlamalar
Grafikler
Paketler
Paketler
Wiki
Wiki
Parçacıklar
Parçacıklar
Üyeler
Üyeler
Collapse sidebar
Close sidebar
Etkinlik
Grafik
Grafikler
Yeni bir konu (issue) oluştur
İşler
Kayıtlar (commit)
Konu (issue) Panoları
Kenar çubuğunu aç
Batuhan Osman TASKAYA
django
Commits
d3db878e
Kaydet (Commit)
d3db878e
authored
Eki 31, 2014
tarafından
Thomas Chaumeny
Kaydeden (comit)
Tim Graham
Kas 03, 2014
Dosyalara gözat
Seçenekler
Dosyalara Gözat
İndir
Eposta Yamaları
Sade Fark
Moved CSRF docs out of contrib.
üst
d968bd52
Hide whitespace changes
Inline
Side-by-side
Showing
16 changed files
with
24 additions
and
32 deletions
+24
-32
index.txt
docs/index.txt
+1
-1
index.txt
docs/ref/contrib/index.txt
+0
-8
csrf.txt
docs/ref/csrf.txt
+6
-7
index.txt
docs/ref/index.txt
+1
-0
middleware.txt
docs/ref/middleware.txt
+1
-1
settings.txt
docs/ref/settings.txt
+2
-2
api.txt
docs/ref/templates/api.txt
+1
-1
builtins.txt
docs/ref/templates/builtins.txt
+1
-1
1.1.txt
docs/releases/1.1.txt
+1
-1
1.2.txt
docs/releases/1.2.txt
+2
-2
1.3.txt
docs/releases/1.3.txt
+1
-1
1.4.11.txt
docs/releases/1.4.11.txt
+1
-1
1.4.txt
docs/releases/1.4.txt
+2
-2
1.5.6.txt
docs/releases/1.5.6.txt
+1
-1
1.6.3.txt
docs/releases/1.6.3.txt
+1
-1
index.txt
docs/topics/forms/index.txt
+2
-2
No files found.
docs/index.txt
Dosyayı görüntüle @
d3db878e
...
@@ -227,7 +227,7 @@ applications and Django provides multiple protection tools and mechanisms:
...
@@ -227,7 +227,7 @@ applications and Django provides multiple protection tools and mechanisms:
* :doc:`Security overview <topics/security>`
* :doc:`Security overview <topics/security>`
* :doc:`Disclosed security issues in Django <releases/security>`
* :doc:`Disclosed security issues in Django <releases/security>`
* :doc:`Clickjacking protection <ref/clickjacking>`
* :doc:`Clickjacking protection <ref/clickjacking>`
* :doc:`Cross Site Request Forgery protection <ref/c
ontrib/c
srf>`
* :doc:`Cross Site Request Forgery protection <ref/csrf>`
* :doc:`Cryptographic signing <topics/signing>`
* :doc:`Cryptographic signing <topics/signing>`
* :ref:`Security Middleware <security-middleware>`
* :ref:`Security Middleware <security-middleware>`
...
...
docs/ref/contrib/index.txt
Dosyayı görüntüle @
d3db878e
...
@@ -25,7 +25,6 @@ those packages have.
...
@@ -25,7 +25,6 @@ those packages have.
admin/index
admin/index
auth
auth
contenttypes
contenttypes
csrf
flatpages
flatpages
formtools/index
formtools/index
gis/index
gis/index
...
@@ -63,13 +62,6 @@ Django model is a separate content type.
...
@@ -63,13 +62,6 @@ Django model is a separate content type.
See the :doc:`contenttypes documentation </ref/contrib/contenttypes>`.
See the :doc:`contenttypes documentation </ref/contrib/contenttypes>`.
csrf
====
A middleware for preventing Cross Site Request Forgeries
See the :doc:`csrf documentation </ref/contrib/csrf>`.
flatpages
flatpages
=========
=========
...
...
docs/ref/c
ontrib/c
srf.txt
→
docs/ref/csrf.txt
Dosyayı görüntüle @
d3db878e
...
@@ -26,15 +26,14 @@ below.
...
@@ -26,15 +26,14 @@ below.
How to use it
How to use it
=============
=============
To
enable CSRF protection for
your views, follow these steps:
To
take advantage of CSRF protection in
your views, follow these steps:
1. Add the middleware
1. The CSRF middleware is activated by default in the
``'django.middleware.csrf.CsrfViewMiddleware'`` to your list of
:setting:`MIDDLEWARE_CLASSES` setting. If you override that setting, remember
middleware classes, :setting:`MIDDLEWARE_CLASSES`. (It should come
that ``'django.middleware.csrf.CsrfViewMiddleware'`` should come before any
before any view middleware that assume that CSRF attacks have
view middleware that assume that CSRF attacks have been dealt with.
been dealt with.)
Alternatively, you can use the decorator
If you disabled it, which is not recommended, you can use
:func:`~django.views.decorators.csrf.csrf_protect` on particular views
:func:`~django.views.decorators.csrf.csrf_protect` on particular views
you want to protect (see below).
you want to protect (see below).
...
...
docs/ref/index.txt
Dosyayı görüntüle @
d3db878e
...
@@ -10,6 +10,7 @@ API Reference
...
@@ -10,6 +10,7 @@ API Reference
class-based-views/index
class-based-views/index
clickjacking
clickjacking
contrib/index
contrib/index
csrf
databases
databases
django-admin
django-admin
exceptions
exceptions
...
...
docs/ref/middleware.txt
Dosyayı görüntüle @
d3db878e
...
@@ -388,7 +388,7 @@ CSRF protection middleware
...
@@ -388,7 +388,7 @@ CSRF protection middleware
Adds protection against Cross Site Request Forgeries by adding hidden form
Adds protection against Cross Site Request Forgeries by adding hidden form
fields to POST forms and checking requests for the correct value. See the
fields to POST forms and checking requests for the correct value. See the
:doc:`Cross Site Request Forgery protection documentation </ref/c
ontrib/c
srf>`.
:doc:`Cross Site Request Forgery protection documentation </ref/csrf>`.
X-Frame-Options middleware
X-Frame-Options middleware
--------------------------
--------------------------
...
...
docs/ref/settings.txt
Dosyayı görüntüle @
d3db878e
...
@@ -374,7 +374,7 @@ CSRF_COOKIE_NAME
...
@@ -374,7 +374,7 @@ CSRF_COOKIE_NAME
Default: ``'csrftoken'``
Default: ``'csrftoken'``
The name of the cookie to use for the CSRF authentication token. This can be whatever you
The name of the cookie to use for the CSRF authentication token. This can be whatever you
want. See :doc:`/ref/c
ontrib/c
srf`.
want. See :doc:`/ref/csrf`.
.. setting:: CSRF_COOKIE_PATH
.. setting:: CSRF_COOKIE_PATH
...
@@ -415,7 +415,7 @@ is rejected by the CSRF protection. The function should have this signature::
...
@@ -415,7 +415,7 @@ is rejected by the CSRF protection. The function should have this signature::
where ``reason`` is a short message (intended for developers or logging, not for
where ``reason`` is a short message (intended for developers or logging, not for
end users) indicating the reason the request was rejected. See
end users) indicating the reason the request was rejected. See
:doc:`/ref/c
ontrib/c
srf`.
:doc:`/ref/csrf`.
.. setting:: DATABASES
.. setting:: DATABASES
...
...
docs/ref/templates/api.txt
Dosyayı görüntüle @
d3db878e
...
@@ -576,7 +576,7 @@ django.core.context_processors.csrf
...
@@ -576,7 +576,7 @@ django.core.context_processors.csrf
This processor adds a token that is needed by the :ttag:`csrf_token` template
This processor adds a token that is needed by the :ttag:`csrf_token` template
tag for protection against :doc:`Cross Site Request Forgeries
tag for protection against :doc:`Cross Site Request Forgeries
</ref/c
ontrib/c
srf>`.
</ref/csrf>`.
django.core.context_processors.request
django.core.context_processors.request
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
...
...
docs/ref/templates/builtins.txt
Dosyayı görüntüle @
d3db878e
...
@@ -70,7 +70,7 @@ csrf_token
...
@@ -70,7 +70,7 @@ csrf_token
^^^^^^^^^^
^^^^^^^^^^
This tag is used for CSRF protection, as described in the documentation for
This tag is used for CSRF protection, as described in the documentation for
:doc:`Cross Site Request Forgeries </ref/c
ontrib/c
srf>`.
:doc:`Cross Site Request Forgeries </ref/csrf>`.
.. templatetag:: cycle
.. templatetag:: cycle
...
...
docs/releases/1.1.txt
Dosyayı görüntüle @
d3db878e
...
@@ -372,7 +372,7 @@ Other improvements
...
@@ -372,7 +372,7 @@ Other improvements
Other new features and changes introduced since Django 1.0 include:
Other new features and changes introduced since Django 1.0 include:
* The :doc:`CSRF protection middleware </ref/c
ontrib/c
srf>` has been split into
* The :doc:`CSRF protection middleware </ref/csrf>` has been split into
two classes -- ``CsrfViewMiddleware`` checks incoming requests, and
two classes -- ``CsrfViewMiddleware`` checks incoming requests, and
``CsrfResponseMiddleware`` processes outgoing responses. The combined
``CsrfResponseMiddleware`` processes outgoing responses. The combined
``CsrfMiddleware`` class (which does both) remains for
``CsrfMiddleware`` class (which does both) remains for
...
...
docs/releases/1.2.txt
Dosyayı görüntüle @
d3db878e
...
@@ -141,7 +141,7 @@ Improved CSRF protection
...
@@ -141,7 +141,7 @@ Improved CSRF protection
------------------------
------------------------
Django now has much improved protection against :doc:`Cross-Site Request Forgery
Django now has much improved protection against :doc:`Cross-Site Request Forgery
(CSRF) attacks</ref/c
ontrib/c
srf>`. This type of attack occurs when a malicious
(CSRF) attacks</ref/csrf>`. This type of attack occurs when a malicious
Web site contains a link, a form button or some JavaScript that is intended to
Web site contains a link, a form button or some JavaScript that is intended to
perform some action on your Web site, using the credentials of a logged-in user
perform some action on your Web site, using the credentials of a logged-in user
who visits the malicious site in their browser. A related type of attack, "login
who visits the malicious site in their browser. A related type of attack, "login
...
@@ -426,7 +426,7 @@ CSRF Protection
...
@@ -426,7 +426,7 @@ CSRF Protection
---------------
---------------
We've made large changes to the way CSRF protection works, detailed in
We've made large changes to the way CSRF protection works, detailed in
:doc:`the CSRF documentation </ref/c
ontrib/c
srf>`. Here are the major changes you
:doc:`the CSRF documentation </ref/csrf>`. Here are the major changes you
should be aware of:
should be aware of:
* ``CsrfResponseMiddleware`` and ``CsrfMiddleware`` have been deprecated and
* ``CsrfResponseMiddleware`` and ``CsrfMiddleware`` have been deprecated and
...
...
docs/releases/1.3.txt
Dosyayı görüntüle @
d3db878e
...
@@ -341,7 +341,7 @@ Prior to Django 1.2.5, Django's CSRF-prevention system exempted AJAX
...
@@ -341,7 +341,7 @@ Prior to Django 1.2.5, Django's CSRF-prevention system exempted AJAX
requests from CSRF verification; due to `security issues`_ reported to
requests from CSRF verification; due to `security issues`_ reported to
us, however, *all* requests are now subjected to CSRF
us, however, *all* requests are now subjected to CSRF
verification. Consult :doc:`the Django CSRF documentation
verification. Consult :doc:`the Django CSRF documentation
</ref/c
ontrib/c
srf>` for details on how to handle CSRF verification in
</ref/csrf>` for details on how to handle CSRF verification in
AJAX requests.
AJAX requests.
.. _security issues: https://www.djangoproject.com/weblog/2011/feb/08/security/
.. _security issues: https://www.djangoproject.com/weblog/2011/feb/08/security/
...
...
docs/releases/1.4.11.txt
Dosyayı görüntüle @
d3db878e
...
@@ -52,7 +52,7 @@ Caching of anonymous pages could reveal CSRF token
...
@@ -52,7 +52,7 @@ Caching of anonymous pages could reveal CSRF token
Django includes both a :doc:`caching framework </topics/cache>` and a system
Django includes both a :doc:`caching framework </topics/cache>` and a system
for :doc:`preventing cross-site request forgery (CSRF) attacks
for :doc:`preventing cross-site request forgery (CSRF) attacks
</ref/c
ontrib/c
srf/>`. The CSRF-protection system is based on a random nonce
</ref/csrf/>`. The CSRF-protection system is based on a random nonce
sent to the client in a cookie which must be sent by the client on future
sent to the client in a cookie which must be sent by the client on future
requests and, in forms, a hidden value which must be submitted back with the
requests and, in forms, a hidden value which must be submitted back with the
form.
form.
...
...
docs/releases/1.4.txt
Dosyayı görüntüle @
d3db878e
...
@@ -499,7 +499,7 @@ We've made various improvements to our CSRF features, including the
...
@@ -499,7 +499,7 @@ We've made various improvements to our CSRF features, including the
help with AJAX-heavy sites; protection for PUT and DELETE requests; and the
help with AJAX-heavy sites; protection for PUT and DELETE requests; and the
:setting:`CSRF_COOKIE_SECURE` and :setting:`CSRF_COOKIE_PATH` settings, which can
:setting:`CSRF_COOKIE_SECURE` and :setting:`CSRF_COOKIE_PATH` settings, which can
improve the security and usefulness of CSRF protection. See the :doc:`CSRF
improve the security and usefulness of CSRF protection. See the :doc:`CSRF
docs </ref/c
ontrib/c
srf>` for more information.
docs </ref/csrf>` for more information.
Error report filtering
Error report filtering
~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~
...
@@ -996,7 +996,7 @@ expression, such as periods.
...
@@ -996,7 +996,7 @@ expression, such as periods.
CSRF protection extended to PUT and DELETE
CSRF protection extended to PUT and DELETE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Previously, Django's :doc:`CSRF protection </ref/c
ontrib/c
srf/>` provided
Previously, Django's :doc:`CSRF protection </ref/csrf/>` provided
protection only against POST requests. Since use of PUT and DELETE methods in
protection only against POST requests. Since use of PUT and DELETE methods in
AJAX applications is becoming more common, we now protect all methods not
AJAX applications is becoming more common, we now protect all methods not
defined as safe by :rfc:`2616` -- i.e., we exempt GET, HEAD, OPTIONS and TRACE,
defined as safe by :rfc:`2616` -- i.e., we exempt GET, HEAD, OPTIONS and TRACE,
...
...
docs/releases/1.5.6.txt
Dosyayı görüntüle @
d3db878e
...
@@ -51,7 +51,7 @@ Caching of anonymous pages could reveal CSRF token
...
@@ -51,7 +51,7 @@ Caching of anonymous pages could reveal CSRF token
Django includes both a :doc:`caching framework </topics/cache>` and a system
Django includes both a :doc:`caching framework </topics/cache>` and a system
for :doc:`preventing cross-site request forgery (CSRF) attacks
for :doc:`preventing cross-site request forgery (CSRF) attacks
</ref/c
ontrib/c
srf/>`. The CSRF-protection system is based on a random nonce
</ref/csrf/>`. The CSRF-protection system is based on a random nonce
sent to the client in a cookie which must be sent by the client on future
sent to the client in a cookie which must be sent by the client on future
requests and, in forms, a hidden value which must be submitted back with the
requests and, in forms, a hidden value which must be submitted back with the
form.
form.
...
...
docs/releases/1.6.3.txt
Dosyayı görüntüle @
d3db878e
...
@@ -51,7 +51,7 @@ Caching of anonymous pages could reveal CSRF token
...
@@ -51,7 +51,7 @@ Caching of anonymous pages could reveal CSRF token
Django includes both a :doc:`caching framework </topics/cache>` and a system
Django includes both a :doc:`caching framework </topics/cache>` and a system
for :doc:`preventing cross-site request forgery (CSRF) attacks
for :doc:`preventing cross-site request forgery (CSRF) attacks
</ref/c
ontrib/c
srf/>`. The CSRF-protection system is based on a random nonce
</ref/csrf/>`. The CSRF-protection system is based on a random nonce
sent to the client in a cookie which must be sent by the client on future
sent to the client in a cookie which must be sent by the client on future
requests and, in forms, a hidden value which must be submitted back with the
requests and, in forms, a hidden value which must be submitted back with the
form.
form.
...
...
docs/topics/forms/index.txt
Dosyayı görüntüle @
d3db878e
...
@@ -81,7 +81,7 @@ or for binary data, such as an image. A Web application that uses ``GET``
...
@@ -81,7 +81,7 @@ or for binary data, such as an image. A Web application that uses ``GET``
requests for admin forms is a security risk: it can be easy for an attacker to
requests for admin forms is a security risk: it can be easy for an attacker to
mimic a form's request to gain access to sensitive parts of the system.
mimic a form's request to gain access to sensitive parts of the system.
``POST``, coupled with other protections like Django's :doc:`CSRF protection
``POST``, coupled with other protections like Django's :doc:`CSRF protection
</ref/c
ontrib/c
srf/>` offers more control over access.
</ref/csrf/>` offers more control over access.
On the other hand, ``GET`` is suitable for things like a web search form,
On the other hand, ``GET`` is suitable for things like a web search form,
because the URLs that represent a ``GET`` request can easily be bookmarked,
because the URLs that represent a ``GET`` request can easily be bookmarked,
...
@@ -335,7 +335,7 @@ from that ``{{ form }}`` by Django's template language.
...
@@ -335,7 +335,7 @@ from that ``{{ form }}`` by Django's template language.
.. admonition:: Forms and Cross Site Request Forgery protection
.. admonition:: Forms and Cross Site Request Forgery protection
Django ships with an easy-to-use :doc:`protection against Cross Site Request
Django ships with an easy-to-use :doc:`protection against Cross Site Request
Forgeries </ref/c
ontrib/c
srf>`. When submitting a form via ``POST`` with
Forgeries </ref/csrf>`. When submitting a form via ``POST`` with
CSRF protection enabled you must use the :ttag:`csrf_token` template tag
CSRF protection enabled you must use the :ttag:`csrf_token` template tag
as in the preceding example. However, since CSRF protection is not
as in the preceding example. However, since CSRF protection is not
directly tied to forms in templates, this tag is omitted from the
directly tied to forms in templates, this tag is omitted from the
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment