diff --git a/tests/regressiontests/csrf_tests/tests.py b/tests/regressiontests/csrf_tests/tests.py index f2fb409076..6e6c87a112 100644 --- a/tests/regressiontests/csrf_tests/tests.py +++ b/tests/regressiontests/csrf_tests/tests.py @@ -43,7 +43,7 @@ class TestingHttpRequest(HttpRequest): more easily """ def is_secure(self): - return getattr(self, '_is_secure', False) + return getattr(self, '_is_secure_override', False) class CsrfViewMiddlewareTest(TestCase): # The csrf token is potentially from an untrusted source, so could have @@ -259,7 +259,7 @@ class CsrfViewMiddlewareTest(TestCase): Test that a POST HTTPS request with a bad referer is rejected """ req = self._get_POST_request_with_token() - req._is_secure = True + req._is_secure_override = True req.META['HTTP_HOST'] = 'www.example.com' req.META['HTTP_REFERER'] = 'https://www.evil.org/somepage' req2 = CsrfViewMiddleware().process_view(req, post_form_view, (), {}) @@ -271,7 +271,7 @@ class CsrfViewMiddlewareTest(TestCase): Test that a POST HTTPS request with a good referer is accepted """ req = self._get_POST_request_with_token() - req._is_secure = True + req._is_secure_override = True req.META['HTTP_HOST'] = 'www.example.com' req.META['HTTP_REFERER'] = 'https://www.example.com/somepage' req2 = CsrfViewMiddleware().process_view(req, post_form_view, (), {}) @@ -284,7 +284,7 @@ class CsrfViewMiddlewareTest(TestCase): """ # See ticket #15617 req = self._get_POST_request_with_token() - req._is_secure = True + req._is_secure_override = True req.META['HTTP_HOST'] = 'www.example.com' req.META['HTTP_REFERER'] = 'https://www.example.com' req2 = CsrfViewMiddleware().process_view(req, post_form_view, (), {})