@@ -3392,34 +3392,8 @@ def _make_locale_paths(settings): # pylint: disable=missing-function-docstring
3392
3392
CSRF_COOKIE_SECURE = False
3393
3393
CSRF_TRUSTED_ORIGINS = []
3394
3394
CSRF_TRUSTED_ORIGINS_WITH_SCHEME = []
3395
-
3396
- # If setting a cross-domain cookie, it's really important to choose
3397
- # a name for the cookie that is DIFFERENT than the cookies used
3398
- # by each subdomain. For example, suppose the applications
3399
- # at these subdomains are configured to use the following cookie names:
3400
- #
3401
- # 1) foo.example.com --> "csrftoken"
3402
- # 2) baz.example.com --> "csrftoken"
3403
- # 3) bar.example.com --> "csrftoken"
3404
- #
3405
- # For the cross-domain version of the CSRF cookie, you need to choose
3406
- # a name DIFFERENT than "csrftoken"; otherwise, the new token configured
3407
- # for ".example.com" could conflict with the other cookies,
3408
- # non-deterministically causing 403 responses.
3409
- CROSS_DOMAIN_CSRF_COOKIE_NAME = ''
3410
-
3411
- # When setting the domain for the "cross-domain" version of the CSRF
3412
- # cookie, you should choose something like: ".example.com"
3413
- # (note the leading dot), where both the referer and the host
3414
- # are subdomains of "example.com".
3415
- #
3416
- # Browser security rules require that
3417
- # the cookie domain matches the domain of the server; otherwise
3418
- # the cookie won't get set. And once the cookie gets set, the client
3419
- # needs to be on a domain that matches the cookie domain, otherwise
3420
- # the client won't be able to read the cookie.
3421
3395
CROSS_DOMAIN_CSRF_COOKIE_DOMAIN = ''
3422
-
3396
+ CROSS_DOMAIN_CSRF_COOKIE_NAME = ''
3423
3397
3424
3398
######################### Django Rest Framework ########################
3425
3399
0 commit comments