@@ -3392,34 +3392,8 @@ def _make_locale_paths(settings): # pylint: disable=missing-function-docstring
33923392CSRF_COOKIE_SECURE = False
33933393CSRF_TRUSTED_ORIGINS = []
33943394CSRF_TRUSTED_ORIGINS_WITH_SCHEME = []
3395-
3396- # If setting a cross-domain cookie, it's really important to choose
3397- # a name for the cookie that is DIFFERENT than the cookies used
3398- # by each subdomain. For example, suppose the applications
3399- # at these subdomains are configured to use the following cookie names:
3400- #
3401- # 1) foo.example.com --> "csrftoken"
3402- # 2) baz.example.com --> "csrftoken"
3403- # 3) bar.example.com --> "csrftoken"
3404- #
3405- # For the cross-domain version of the CSRF cookie, you need to choose
3406- # a name DIFFERENT than "csrftoken"; otherwise, the new token configured
3407- # for ".example.com" could conflict with the other cookies,
3408- # non-deterministically causing 403 responses.
3409- CROSS_DOMAIN_CSRF_COOKIE_NAME = ''
3410-
3411- # When setting the domain for the "cross-domain" version of the CSRF
3412- # cookie, you should choose something like: ".example.com"
3413- # (note the leading dot), where both the referer and the host
3414- # are subdomains of "example.com".
3415- #
3416- # Browser security rules require that
3417- # the cookie domain matches the domain of the server; otherwise
3418- # the cookie won't get set. And once the cookie gets set, the client
3419- # needs to be on a domain that matches the cookie domain, otherwise
3420- # the client won't be able to read the cookie.
34213395CROSS_DOMAIN_CSRF_COOKIE_DOMAIN = ''
3422-
3396+ CROSS_DOMAIN_CSRF_COOKIE_NAME = ''
34233397
34243398######################### Django Rest Framework ########################
34253399
0 commit comments