Skip to content

Commit 287bfe4

Browse files
committed
Rewording security sections to be even more clear that secure_channel and ip don't actually *restrict* access
1 parent 3d5ecb3 commit 287bfe4

File tree

1 file changed

+13
-3
lines changed

1 file changed

+13
-3
lines changed

book/security.rst

+13-3
Original file line numberDiff line numberDiff line change
@@ -893,6 +893,14 @@ prevent any direct access to these resources from a web browser (by guessing the
893893
ESI URL pattern), the ESI route **must** be secured to be only visible from
894894
the trusted reverse proxy cache.
895895

896+
.. caution::
897+
898+
As you'll read in the explanation below the example, the ``ip`` option
899+
does not restrict to a specific IP address. Instead, using the ``ip``
900+
key means that the ``access_control`` entry will only match this IP address,
901+
and users accessing it from a different IP address will continue down
902+
the ``acces_control`` list.
903+
896904
Here is an example of how you might secure all ESI routes that start with a
897905
given prefix, ``/esi``, from outside access:
898906

@@ -951,11 +959,13 @@ Now, if the same request comes from ``127.0.0.1``:
951959

952960
.. _book-security-securing-channel:
953961

954-
Securing by Channel
955-
~~~~~~~~~~~~~~~~~~~
962+
Forcing a Channel (http, https)
963+
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
956964

957965
You can also require a user to access a URL via SSL; just use the
958-
``requires_channel`` argument in any ``access_control`` entries:
966+
``requires_channel`` argument in any ``access_control`` entries. If this
967+
``access_control`` is matched and the request is using the ``http`` channel,
968+
the user will be redirected to ``https``:
959969

960970
.. configuration-block::
961971

0 commit comments

Comments
 (0)