diff options
| author | Tim Graham <timograham@gmail.com> | 2017-09-02 20:12:27 -0400 |
|---|---|---|
| committer | Tim Graham <timograham@gmail.com> | 2017-09-22 12:51:18 -0400 |
| commit | 96107e2844d27a7713152515051654ce70d57660 (patch) | |
| tree | b7a31e91c81256b0b8dd85a6786dfc5a46a44d9a /django/utils | |
| parent | e47b56d791eb6c81c6d83529b7a068959ea1c1ec (diff) | |
Refs #26956 -- Removed the host parameter of django.utils.http.is_safe_url().
Per deprecation timeline.
Diffstat (limited to 'django/utils')
| -rw-r--r-- | django/utils/http.py | 12 |
1 files changed, 1 insertions, 11 deletions
diff --git a/django/utils/http.py b/django/utils/http.py index 07b6ae246a..c13f44602b 100644 --- a/django/utils/http.py +++ b/django/utils/http.py @@ -3,7 +3,6 @@ import calendar import datetime import re import unicodedata -import warnings from binascii import Error as BinasciiError from email.utils import formatdate from urllib.parse import ( @@ -14,7 +13,6 @@ from urllib.parse import ( from django.core.exceptions import TooManyFieldsSent from django.utils.datastructures import MultiValueDict -from django.utils.deprecation import RemovedInDjango21Warning from django.utils.encoding import force_bytes from django.utils.functional import keep_lazy_text @@ -264,7 +262,7 @@ def is_same_domain(host, pattern): ) -def is_safe_url(url, host=None, allowed_hosts=None, require_https=False): +def is_safe_url(url, allowed_hosts=None, require_https=False): """ Return ``True`` if the url is a safe redirection (i.e. it doesn't point to a different host and uses a safe scheme). @@ -280,14 +278,6 @@ def is_safe_url(url, host=None, allowed_hosts=None, require_https=False): return False if allowed_hosts is None: allowed_hosts = set() - if host: - warnings.warn( - "The host argument is deprecated, use allowed_hosts instead.", - RemovedInDjango21Warning, - stacklevel=2, - ) - # Avoid mutating the passed in allowed_hosts. - allowed_hosts = allowed_hosts | {host} # Chrome treats \ completely as / in paths but it could be part of some # basic auth credentials so we need to check both URLs. return (_is_safe_url(url, allowed_hosts, require_https=require_https) and |
