@@ -29,19 +29,19 @@ var CSRFFilter = func(c *revel.Controller, fc []revel.Filter) {
29
29
30
30
// [OWASP]; General Recommendation: Synchronizer Token Pattern:
31
31
// CSRF tokens must be associated with the user's current session.
32
- tokenCookie , found := c .Session [cookieName ]
32
+ tokenCookie , found := c .Session [cookieName ].( string )
33
33
realToken := ""
34
34
if ! found {
35
35
realToken = generateNewToken (c )
36
36
} else {
37
37
realToken = tokenCookie
38
- revel .TRACE . Printf ("REVEL-CSRF: Session's token: '%s'\n " , realToken )
38
+ revel .AppLog . Debugf ("REVEL-CSRF: Session's token: '%s'\n " , realToken )
39
39
if len (realToken ) != lengthCSRFToken {
40
40
// Wrong length; token has either been tampered with, we're migrating
41
41
// onto a new algorithm for generating tokens, or a new session has
42
42
// been initiated. In any case, a new token is generated and the
43
43
// error will be detected later.
44
- revel .TRACE . Printf ("REVEL_CSRF: Bad token length: found %d, expected %d" ,
44
+ revel .AppLog . Debugf ("REVEL_CSRF: Bad token length: found %d, expected %d" ,
45
45
len (realToken ), lengthCSRFToken )
46
46
realToken = generateNewToken (c )
47
47
}
@@ -52,7 +52,7 @@ var CSRFFilter = func(c *revel.Controller, fc []revel.Filter) {
52
52
// See http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol#Safe_methods
53
53
unsafeMethod := ! safeMethods .MatchString (r .Method )
54
54
if unsafeMethod && ! IsExempted (r .URL .Path ) {
55
- revel .TRACE . Printf ("REVEL-CSRF: Processing unsafe '%s' method..." , r .Method )
55
+ revel .AppLog . Debugf ("REVEL-CSRF: Processing unsafe '%s' method..." , r .Method )
56
56
if r .URL .Scheme == "https" {
57
57
// See [OWASP]; Checking the Referer Header.
58
58
referer , err := url .Parse (r .Header .Get ("Referer" ))
@@ -80,7 +80,7 @@ var CSRFFilter = func(c *revel.Controller, fc []revel.Filter) {
80
80
// Get CSRF token from form.
81
81
sentToken = c .Params .Get (fieldName )
82
82
}
83
- revel .TRACE . Printf ("REVEL-CSRF: Token received from client: '%s'" , sentToken )
83
+ revel .AppLog . Debugf ("REVEL-CSRF: Token received from client: '%s'" , sentToken )
84
84
85
85
if len (sentToken ) != len (realToken ) {
86
86
c .Result = c .Forbidden (errBadToken )
@@ -91,7 +91,7 @@ var CSRFFilter = func(c *revel.Controller, fc []revel.Filter) {
91
91
c .Result = c .Forbidden (errBadToken )
92
92
return
93
93
}
94
- revel .TRACE . Println ("REVEL-CSRF: Token successfully checked." )
94
+ revel .AppLog . Debugf ("REVEL-CSRF: Token successfully checked." )
95
95
}
96
96
97
97
fc [0 ](c , fc [1 :])
0 commit comments