mirror of
https://github.com/django/django.git
synced 2025-10-31 09:41:08 +00:00
Fixed #21911 -- Made admin views redirect to login when needed
Historically, the Django admin used to pass through the request from an unauthorized access to the login view directly. Now we are using a proper redirection, which is also preventing inadvertantly changing data when POSTing login data to an admin view when user is already authorized. Thanks Marc Tamlyn and Tim Graham for the reviews.
This commit is contained in:
@@ -830,6 +830,8 @@ a :exc:`~exceptions.ValueError` when encountering them, you will have to
|
||||
install pytz_. You may be affected by this problem if you use Django's time
|
||||
zone-related date formats or :mod:`django.contrib.syndication`.
|
||||
|
||||
.. _pytz: https://pypi.python.org/pypi/pytz/
|
||||
|
||||
``remove()`` and ``clear()`` methods of related managers
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
@@ -858,7 +860,15 @@ Fixing the issues introduced some backward incompatible changes:
|
||||
may not be an issue depending on your database and your data itself.
|
||||
See :ref:`this note <nested-queries-performance>` for more details.
|
||||
|
||||
.. _pytz: https://pypi.python.org/pypi/pytz/
|
||||
Admin login redirection strategy
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
Historically, the Django admin site passed the request from an unauthorized or
|
||||
unauthenticated user directly to the login view, without HTTP redirection. In
|
||||
Django 1.7, this behavior changed to conform to a more traditional workflow
|
||||
where any unauthorized request to an admin page will be redirected (by HTTP
|
||||
status code 302) to the login page, with the ``next`` parameter set to the
|
||||
referring path. The user will be redirected there after a successful login.
|
||||
|
||||
Miscellaneous
|
||||
~~~~~~~~~~~~~
|
||||
|
||||
Reference in New Issue
Block a user