Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disabling flask-talisman by default #7535

Merged
merged 1 commit into from
May 20, 2019

Conversation

mistercrunch
Copy link
Member

CATEGORY

Choose one

  • Bug Fix

SUMMARY

flask-talisman was enabled recently and while it may be virtuous in some
cases, it seems to break things out of the box.

Locally and in dev mode, upon my first redirect it sends to HTTPS and
things it crashes.

I think it should be opt-in, maybe we can recommend turning this on in
production in the docs?

BEFORE/AFTER SCREENSHOTS OR ANIMATED GIF

Screen Shot 2019-05-16 at 9 16 24 PM

Screen Shot 2019-05-16 at 9 16 10 PM

flask-talisman was enabled recently and while it may be virtuous in some
cases, it seems to break things out of the box.

Locally and in dev mode, upon my first redirect it sends to HTTPS and
things it crashes.

I think it should be opt-in, maybe we can recommend turning this on in
production in the docs?
@john-bodley
Copy link
Member

john-bodley commented May 17, 2019

@mistercrunch is this in development or production? If you're in development then setting FLASK_ENV=development enables the Flask debug mode and thus ensures that it uses HTTP rather than HTTPS.

@lrosenman
Copy link

@john-bodley I was the person on Slack that @mistercrunch helped. With talisman defaulting to ON and trying to set up a production setup, and zero hints on how to do the TLS certificates, I pulled my hair out all day yesterday.

Until/unless there is documentation on how to appease talisman's cert requirements, etc, I'd vote strongly for it being OFF by default, and strictly OPT-IN.

@lrosenman
Copy link

I also have concerns about making certificates for a Docker container that will be deployed multiple times on differing hosts, and no easy way to inject the certificates at build time.

@mistercrunch
Copy link
Member Author

Pretty sure I tested and got the same issue with FLASK_ENV=development

@mistercrunch mistercrunch merged commit 1fdc96a into apache:master May 20, 2019
michellethomas pushed a commit to michellethomas/panoramix that referenced this pull request Jun 1, 2019
flask-talisman was enabled recently and while it may be virtuous in some
cases, it seems to break things out of the box.

Locally and in dev mode, upon my first redirect it sends to HTTPS and
things it crashes.

I think it should be opt-in, maybe we can recommend turning this on in
production in the docs?

(cherry picked from commit 1fdc96a)
michellethomas pushed a commit that referenced this pull request Jun 1, 2019
flask-talisman was enabled recently and while it may be virtuous in some
cases, it seems to break things out of the box.

Locally and in dev mode, upon my first redirect it sends to HTTPS and
things it crashes.

I think it should be opt-in, maybe we can recommend turning this on in
production in the docs?

(cherry picked from commit 1fdc96a)
@mistercrunch mistercrunch added 🏷️ bot A label used by `supersetbot` to keep track of which PR where auto-tagged with release labels 🚢 0.34.0 labels Feb 28, 2024
cccs-rc pushed a commit to CybercentreCanada/superset that referenced this pull request Mar 6, 2024
flask-talisman was enabled recently and while it may be virtuous in some
cases, it seems to break things out of the box.

Locally and in dev mode, upon my first redirect it sends to HTTPS and
things it crashes.

I think it should be opt-in, maybe we can recommend turning this on in
production in the docs?

(cherry picked from commit 42b28ff)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
🏷️ bot A label used by `supersetbot` to keep track of which PR where auto-tagged with release labels size/XS 🚢 0.34.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants