diff options
| author | Chris Jerdonek <chris.jerdonek@gmail.com> | 2021-08-23 00:09:19 -0700 |
|---|---|---|
| committer | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2021-11-29 10:48:31 +0100 |
| commit | 3ff7f6cf07a722635d690785c31ac89484134bee (patch) | |
| tree | efdddf6b4996c5120573263b336988734eb26c8c /django/middleware | |
| parent | 5d80843ebc5376d00f98bf2a6aadbada4c29365c (diff) | |
Refs #32800 -- Renamed _sanitize_token() to _check_token_format().
Diffstat (limited to 'django/middleware')
| -rw-r--r-- | django/middleware/csrf.py | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/django/middleware/csrf.py b/django/middleware/csrf.py index 41bf8640d6..6be68ebd76 100644 --- a/django/middleware/csrf.py +++ b/django/middleware/csrf.py @@ -128,7 +128,7 @@ class InvalidTokenFormat(Exception): self.reason = reason -def _sanitize_token(token): +def _check_token_format(token): """ Raise an InvalidTokenFormat error if the token has an invalid length or characters that aren't allowed. The token argument can be a CSRF cookie @@ -239,7 +239,7 @@ class CsrfViewMiddleware(MiddlewareMixin): csrf_secret = None else: # This can raise InvalidTokenFormat. - _sanitize_token(csrf_secret) + _check_token_format(csrf_secret) if csrf_secret is None: return None # Django versions before 4.0 masked the secret before storing. @@ -386,7 +386,7 @@ class CsrfViewMiddleware(MiddlewareMixin): token_source = 'POST' try: - _sanitize_token(request_csrf_token) + _check_token_format(request_csrf_token) except InvalidTokenFormat as exc: reason = self._bad_token_message(exc.reason, token_source) raise RejectRequest(reason) |
