Unauthorized redirect location contains current path params? #658
Unanswered
WilliamMayor
asked this question in
Q&A
Replies: 2 comments
-
Hello, I have the same observation. diff --git a/src/flask_login/utils.py b/src/flask_login/utils.py
index 44e7168..68656a0 100644
--- a/src/flask_login/utils.py
+++ b/src/flask_login/utils.py
@@ -94,7 +94,7 @@ def expand_login_view(login_view):
if login_view.startswith(("https://", "http://", "/")):
return login_view
else:
- if request.view_args is None:
+ if request.view_args is None or request.url_rule.subdomain == '':
return url_for(login_view)
else:
return url_for(login_view, **request.view_args) |
Beta Was this translation helpful? Give feedback.
0 replies
-
Merged #663 to only add view args defined by the current route's |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hey,
I was told to cross post this here: #657
I did genuinely think it was a bug? Or at least unintended side effects?
Is this working as intended? Should I change our integration?
Beta Was this translation helpful? Give feedback.
All reactions