Skip to content

Commit 5aca7a9

Browse files
committed
Moved glog trace priorities back to 2. 0 is high priority and too many log entries were produced.
1 parent 2ec83ef commit 5aca7a9

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

csrf.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -34,13 +34,13 @@ var CSRFFilter = func(c *revel.Controller, fc []revel.Filter) {
3434
realToken = generateNewToken(c)
3535
} else {
3636
realToken = tokenCookie
37-
glog.V(0).Infof("Session's CSRF token: '%s'", realToken)
37+
glog.V(2).Infof("Session's CSRF token: '%s'", realToken)
3838
if len(realToken) != tokenLength {
3939
// Wrong length; token has either been tampered with, we're migrating
4040
// onto a new algorithm for generating tokens, or a new session has
4141
// been initiated. In any case, a new token is generated and the
4242
// error will be detected later.
43-
glog.V(0).Infof("Bad CSRF token length: found %d, expected %d",
43+
glog.V(2).Infof("Bad CSRF token length: found %d, expected %d",
4444
len(realToken), tokenLength)
4545
realToken = generateNewToken(c)
4646
}
@@ -51,7 +51,7 @@ var CSRFFilter = func(c *revel.Controller, fc []revel.Filter) {
5151
// See http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol#Safe_methods
5252
safeMethod, _ := regexp.MatchString("^(GET|HEAD|OPTIONS|TRACE)$", r.Method)
5353
if !safeMethod {
54-
glog.V(0).Infof("Unsafe %s method...", r.Method)
54+
glog.V(2).Infof("Unsafe %s method...", r.Method)
5555
if r.URL.Scheme == "https" {
5656
// See OWASP; Checking the Referer Header.
5757
referer, err := url.Parse(r.Header.Get("Referer"))
@@ -75,7 +75,7 @@ var CSRFFilter = func(c *revel.Controller, fc []revel.Filter) {
7575
if sentToken == "" {
7676
sentToken = c.Params.Get(fieldName)
7777
}
78-
glog.V(0).Infof("CSRF token received: '%s'", sentToken)
78+
glog.V(2).Infof("CSRF token received: '%s'", sentToken)
7979

8080
if len(sentToken) != len(realToken) {
8181
c.Result = c.Forbidden(errBadToken)
@@ -88,7 +88,7 @@ var CSRFFilter = func(c *revel.Controller, fc []revel.Filter) {
8888
}
8989
}
9090
}
91-
glog.V(0).Infoln("CSRF token successfully checked.")
91+
glog.V(2).Infoln("CSRF token successfully checked.")
9292

9393
fc[0](c, fc[1:])
9494
}
@@ -101,7 +101,7 @@ func sameOrigin(u1, u2 *url.URL) bool {
101101
// Generate a new CSRF token.
102102
func generateNewToken(c *revel.Controller) string {
103103
token := generateToken()
104-
glog.V(0).Infof("Generated new CSRF Token: '%s'", token)
104+
glog.V(2).Infof("Generated new CSRF Token: '%s'", token)
105105
c.Session[cookieName] = token
106106
return token
107107
}

0 commit comments

Comments
 (0)