mirror of
https://github.com/dkmstr/openuds.git
synced 2025-03-14 12:58:35 +03:00
Removed nonsense security check right now...
This commit is contained in:
parent
3615db877e
commit
3a69c9205e
@ -175,6 +175,7 @@ MIDDLEWARE = [
|
||||
'django.contrib.messages.middleware.MessageMiddleware',
|
||||
'django.middleware.clickjacking.XFrameOptionsMiddleware',
|
||||
'django.middleware.security.SecurityMiddleware',
|
||||
'uds.core.util.middleware.security.UDSSecurityMiddleware',
|
||||
'uds.core.util.middleware.request.GlobalRequestMiddleware',
|
||||
'uds.core.util.middleware.xua.XUACompatibleMiddleware',
|
||||
'uds.core.util.middleware.redirect.RedirectMiddleware',
|
||||
|
@ -48,10 +48,5 @@ class UDSSecurityMiddleware:
|
||||
self.get_response = get_response
|
||||
|
||||
def __call__(self, request: 'HttpRequest') -> 'HttpResponse':
|
||||
# Old browsers does not sends the sec-fetch* headers, count them as fine
|
||||
# This is just only a layer on the top of the security headers
|
||||
if request.headers.get('Sec-Fetch-Site', 'none') in ('same-origin', 'same-site', 'none'):
|
||||
return self.get_response(request)
|
||||
|
||||
# If Sec-Fetch-Site header is present, but not allowed (that is, not same origin), return 403
|
||||
return HttpResponseForbidden('Forbidden Cross Origin request')
|
||||
# TODO: Implement security checks here
|
||||
return self.get_response(request)
|
||||
|
Loading…
x
Reference in New Issue
Block a user