@@ -34,13 +34,13 @@ var CSRFFilter = func(c *revel.Controller, fc []revel.Filter) {
34
34
realToken = generateNewToken (c )
35
35
} else {
36
36
realToken = tokenCookie
37
- glog .V (0 ).Infof ("Session's CSRF token: '%s'" , realToken )
37
+ glog .V (2 ).Infof ("Session's CSRF token: '%s'" , realToken )
38
38
if len (realToken ) != tokenLength {
39
39
// Wrong length; token has either been tampered with, we're migrating
40
40
// onto a new algorithm for generating tokens, or a new session has
41
41
// been initiated. In any case, a new token is generated and the
42
42
// error will be detected later.
43
- glog .V (0 ).Infof ("Bad CSRF token length: found %d, expected %d" ,
43
+ glog .V (2 ).Infof ("Bad CSRF token length: found %d, expected %d" ,
44
44
len (realToken ), tokenLength )
45
45
realToken = generateNewToken (c )
46
46
}
@@ -51,7 +51,7 @@ var CSRFFilter = func(c *revel.Controller, fc []revel.Filter) {
51
51
// See http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol#Safe_methods
52
52
safeMethod , _ := regexp .MatchString ("^(GET|HEAD|OPTIONS|TRACE)$" , r .Method )
53
53
if ! safeMethod {
54
- glog .V (0 ).Infof ("Unsafe %s method..." , r .Method )
54
+ glog .V (2 ).Infof ("Unsafe %s method..." , r .Method )
55
55
if r .URL .Scheme == "https" {
56
56
// See OWASP; Checking the Referer Header.
57
57
referer , err := url .Parse (r .Header .Get ("Referer" ))
@@ -75,7 +75,7 @@ var CSRFFilter = func(c *revel.Controller, fc []revel.Filter) {
75
75
if sentToken == "" {
76
76
sentToken = c .Params .Get (fieldName )
77
77
}
78
- glog .V (0 ).Infof ("CSRF token received: '%s'" , sentToken )
78
+ glog .V (2 ).Infof ("CSRF token received: '%s'" , sentToken )
79
79
80
80
if len (sentToken ) != len (realToken ) {
81
81
c .Result = c .Forbidden (errBadToken )
@@ -88,7 +88,7 @@ var CSRFFilter = func(c *revel.Controller, fc []revel.Filter) {
88
88
}
89
89
}
90
90
}
91
- glog .V (0 ).Infoln ("CSRF token successfully checked." )
91
+ glog .V (2 ).Infoln ("CSRF token successfully checked." )
92
92
93
93
fc [0 ](c , fc [1 :])
94
94
}
@@ -101,7 +101,7 @@ func sameOrigin(u1, u2 *url.URL) bool {
101
101
// Generate a new CSRF token.
102
102
func generateNewToken (c * revel.Controller ) string {
103
103
token := generateToken ()
104
- glog .V (0 ).Infof ("Generated new CSRF Token: '%s'" , token )
104
+ glog .V (2 ).Infof ("Generated new CSRF Token: '%s'" , token )
105
105
c .Session [cookieName ] = token
106
106
return token
107
107
}
0 commit comments