-
Notifications
You must be signed in to change notification settings - Fork 4.1k
fix: update mock config to include scheme for csrf domains #37120
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: update mock config to include scheme for csrf domains #37120
Conversation
Thanks for the pull request, @wgu-taylor-payne! This repository is currently maintained by Once you've gone through the following steps feel free to tag them in a comment and let them know that your changes are ready for engineering review. 🔘 Get product approvalIf you haven't already, check this list to see if your contribution needs to go through the product review process.
🔘 Provide contextTo help your reviewers and other members of the community understand the purpose and larger context of your changes, feel free to add as much of the following information to the PR description as you can:
🔘 Get a green buildIf one or more checks are failing, continue working on your changes until this is no longer the case and your build turns green. Where can I find more information?If you'd like to get more details on all aspects of the review process for open source pull requests (OSPRs), check out the following resources: When can I expect my changes to be merged?Our goal is to get community contributions seen and reviewed as efficiently as possible. However, the amount of time that it takes to review and merge a PR can vary significantly based on factors such as:
💡 As a result it may take up to several weeks or months to complete a review and merge your PR. |
@kdmccormick - @wgu-ram-chandra brought to my attention that the command in the "Testing instructions" is working on This could potentially lead to unintended consequences, if operators had valid, up-to-date values in |
Incoming potentially stupid question - do you still need CSRF_TRUSTED_ORIGINS_WITH_SCHEME?? If Django>=4.0 must include both scheme and host in CSRF_TRUSTED_ORIGINS, is there any global constraint on allowing a minimum Django version (i.e. <3.x) that would require backwards compatibility to keep the CSRF_TRUSTED_ORIGINS_WITH_SCHEME variable? |
@tonybusa That's a good point. |
2U Release Notice: This PR has been deployed to the edX staging environment in preparation for a release to production. |
2U Release Notice: This PR has been deployed to the edX production environment. |
1 similar comment
2U Release Notice: This PR has been deployed to the edX production environment. |
2U Release Notice: This PR has been deployed to the edX staging environment in preparation for a release to production. |
2U Release Notice: This PR has been deployed to the edX production environment. |
Related to #33228.
Description
Since the scheme must be included for the
CSRF_TRUSTED_ORIGINS
setting since Django 4.0, this changes the values in themock.yml
configuration files to use the scheme for the values underCSRF_TRUSTED_ORIGINS
. We match the values defined underCSRF_TRUSTED_ORIGINS_WITH_SCHEME
key.lms/envs/production.py
pulls fromCSRF_TRUSTED_ORIGINS_WITH_SCHEME
in the YAML config to set theCSRF_TRUSTED_ORIGINS
setting , butcms/envs/production.py
pulls fromCSRF_TRUSTED_ORIGINS
in the YAML. So, this change fixes the CMS when run withmock.yml
.Testing instructions
Run
SERVICE_VARIANT=cms DJANGO_SETTINGS_MODULE=cms.envs.production CMS_CFG=cms/envs/mock.yml ./manage.py cms dump_settings
in a Tutor dev environment onmaster
and you will get this error:Run the command on this branch and it will execute successfully.