Remove use of stronghold whitelisting

This is no longer necessary as both the URLs have been explicitly
marked as public views.
This commit is contained in:
Sunil Mohan Adapa 2017-02-15 16:28:46 +05:30 committed by Sunil Mohan Adapa
parent f54a9d89dd
commit 4699b201a9
No known key found for this signature in database
GPG Key ID: 43EA1CFF0AA7C5F2

View File

@ -205,13 +205,6 @@ def configure_django():
if cfg.secure_proxy_ssl_header:
secure_proxy_ssl_header = (cfg.secure_proxy_ssl_header, 'https')
# XXX: We want use STRONGHOLD_PUBLIC_NAMED_URLS, however, due to a
# bug in stronghold, it compares request.path_info with reversed
# URLs. This leads to a mismatch when script_prefix is set.
# Remove this hack once the bug is fixed. See:
# https://github.com/mgrouchy/django-stronghold/issues/52
public_urls = ('/accounts/login/', '/accounts/logout/')
django.conf.settings.configure(
ALLOWED_HOSTS=['*'],
CACHES={'default':
@ -244,7 +237,6 @@ def configure_django():
SESSION_ENGINE='django.contrib.sessions.backends.file',
SESSION_FILE_PATH=sessions_directory,
STATIC_URL='/'.join([cfg.server_dir, 'static/']).replace('//', '/'),
STRONGHOLD_PUBLIC_URLS=public_urls,
TEMPLATES=templates,
USE_L10N=True,
USE_X_FORWARDED_HOST=cfg.use_x_forwarded_host)