Fixed #23: Replace https hack with header setting
This commit is contained in:
		
							parent
							
								
									b4166f78bb
								
							
						
					
					
						commit
						70d01bf1b4
					
				@ -1,21 +1,6 @@
 | 
			
		||||
from core.models import Config
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
class AlwaysSecureMiddleware:
 | 
			
		||||
    """
 | 
			
		||||
    Locks the request object as always being secure, for when it's behind
 | 
			
		||||
    a HTTPS reverse proxy.
 | 
			
		||||
    """
 | 
			
		||||
 | 
			
		||||
    def __init__(self, get_response):
 | 
			
		||||
        self.get_response = get_response
 | 
			
		||||
 | 
			
		||||
    def __call__(self, request):
 | 
			
		||||
        request.__class__.scheme = "https"
 | 
			
		||||
        response = self.get_response(request)
 | 
			
		||||
        return response
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
class ConfigLoadingMiddleware:
 | 
			
		||||
    """
 | 
			
		||||
    Caches the system config every request
 | 
			
		||||
 | 
			
		||||
@ -5,9 +5,6 @@ from .base import *  # noqa
 | 
			
		||||
# Load secret key from environment with a fallback
 | 
			
		||||
SECRET_KEY = os.environ.get("TAKAHE_SECRET_KEY", "insecure_secret")
 | 
			
		||||
 | 
			
		||||
# Disable the CRSF origin protection
 | 
			
		||||
MIDDLEWARE.insert(0, "core.middleware.AlwaysSecureMiddleware")
 | 
			
		||||
 | 
			
		||||
# Ensure debug features are on
 | 
			
		||||
DEBUG = True
 | 
			
		||||
 | 
			
		||||
@ -16,6 +13,7 @@ CSRF_TRUSTED_ORIGINS = [
 | 
			
		||||
    "http://127.0.0.1:8000",
 | 
			
		||||
    "https://127.0.0.1:8000",
 | 
			
		||||
]
 | 
			
		||||
SECURE_PROXY_SSL_HEADER = ("HTTP_X_FORWARDED_PROTO", "https")
 | 
			
		||||
 | 
			
		||||
EMAIL_BACKEND = "django.core.mail.backends.console.EmailBackend"
 | 
			
		||||
SERVER_EMAIL = "test@example.com"
 | 
			
		||||
 | 
			
		||||
		Reference in New Issue
	
	Block a user