summaryrefslogtreecommitdiff
path: root/django/http/request.py
diff options
context:
space:
mode:
authorWill Hardy <django@willhardy.com.au>2013-03-27 17:37:08 +0100
committerTim Graham <timograham@gmail.com>2013-07-31 10:38:59 -0400
commit1c3c21b38d154eff0286c194711dced2ac39dd3d (patch)
treeb86b70a74d04122e1f8a8ef9e2664ac68249e5a8 /django/http/request.py
parentacd1d439fd9b3e77bc0291dcd62c09f345d8622c (diff)
downloaddjango-1c3c21b38d154eff0286c194711dced2ac39dd3d.tar.gz
Fixed #19987 -- Disabled host validation when DEBUG=True.
The documentation promises that host validation is disabled when DEBUG=True, that all hostnames are accepted. Domains not compliant with RFC 1034/1035 were however being validated, this validation has now been removed when DEBUG=True. Additionally, when DEBUG=False a more detailed SuspiciousOperation exception message is provided when host validation fails because the hostname is not RFC 1034/1035 compliant.
Diffstat (limited to 'django/http/request.py')
-rw-r--r--django/http/request.py9
1 files changed, 7 insertions, 2 deletions
diff --git a/django/http/request.py b/django/http/request.py
index e222081450..9f9f32b1b4 100644
--- a/django/http/request.py
+++ b/django/http/request.py
@@ -68,14 +68,19 @@ class HttpRequest(object):
if server_port != ('443' if self.is_secure() else '80'):
host = '%s:%s' % (host, server_port)
- allowed_hosts = ['*'] if settings.DEBUG else settings.ALLOWED_HOSTS
+ # There is no hostname validation when DEBUG=True
+ if settings.DEBUG:
+ return host
+
domain, port = split_domain_port(host)
- if domain and validate_host(domain, allowed_hosts):
+ if domain and validate_host(domain, settings.ALLOWED_HOSTS):
return host
else:
msg = "Invalid HTTP_HOST header: %r." % host
if domain:
msg += "You may need to add %r to ALLOWED_HOSTS." % domain
+ else:
+ msg += "The domain name provided is not valid according to RFC 1034/1035"
raise DisallowedHost(msg)
def get_full_path(self):