Skip to content

Commit 3333365

Browse files
ErykKulCopilot
andauthored
Potential fix for pull request finding
Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com>
1 parent 8dd3b11 commit 3333365

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

doc/sphinx-guides/source/installation/config.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3952,13 +3952,13 @@ Enables additional hardening for session-cookie API usage. This flag only has an
39523952
The rules are based on request authentication mechanism (session cookie), not on the identity provider used to create the session
39533953
(``builtin``, Shibboleth, OAuth, OIDC, etc.).
39543954

3955-
When enabled, Dataverse requires **every** API request authenticated via session cookie to include:
3955+
When enabled, Dataverse requires all API requests authenticated via session cookie (except the CSRF bootstrap endpoint) to include:
39563956

39573957
- A valid same-origin ``Origin`` or ``Referer`` header.
39583958
- The ``X-Dataverse-CSRF-Token`` header matching the token obtained from ``GET /api/users/:csrf-token``.
39593959

3960-
This applies uniformly to all HTTP methods (``GET``, ``POST``, ``PUT``, ``DELETE``, etc.) and all
3961-
API paths, with no per-endpoint exceptions. The simplicity is intentional: session-cookie API auth
3960+
The only per-endpoint exception is the CSRF bootstrap call itself (``GET /api/users/:csrf-token``), which by design cannot send the token it is obtaining. All other API paths are subject to these requirements, and this applies uniformly to all HTTP methods (``GET``, ``POST``, ``PUT``, ``DELETE``, etc.).
3961+
The simplicity is intentional: session-cookie API auth
39623962
is only used by same-origin front-end clients that always have the CSRF token available.
39633963
Some ``GET`` endpoints in the codebase have side effects, so exempting reads would leave gaps.
39643964

0 commit comments

Comments
 (0)