summaryrefslogtreecommitdiff
path: root/django/middleware
diff options
context:
space:
mode:
authorChris Jerdonek <chris.jerdonek@gmail.com>2021-08-23 00:09:19 -0700
committerMariusz Felisiak <felisiak.mariusz@gmail.com>2021-11-29 10:48:31 +0100
commit3ff7f6cf07a722635d690785c31ac89484134bee (patch)
treeefdddf6b4996c5120573263b336988734eb26c8c /django/middleware
parent5d80843ebc5376d00f98bf2a6aadbada4c29365c (diff)
Refs #32800 -- Renamed _sanitize_token() to _check_token_format().
Diffstat (limited to 'django/middleware')
-rw-r--r--django/middleware/csrf.py6
1 files changed, 3 insertions, 3 deletions
diff --git a/django/middleware/csrf.py b/django/middleware/csrf.py
index 41bf8640d6..6be68ebd76 100644
--- a/django/middleware/csrf.py
+++ b/django/middleware/csrf.py
@@ -128,7 +128,7 @@ class InvalidTokenFormat(Exception):
self.reason = reason
-def _sanitize_token(token):
+def _check_token_format(token):
"""
Raise an InvalidTokenFormat error if the token has an invalid length or
characters that aren't allowed. The token argument can be a CSRF cookie
@@ -239,7 +239,7 @@ class CsrfViewMiddleware(MiddlewareMixin):
csrf_secret = None
else:
# This can raise InvalidTokenFormat.
- _sanitize_token(csrf_secret)
+ _check_token_format(csrf_secret)
if csrf_secret is None:
return None
# Django versions before 4.0 masked the secret before storing.
@@ -386,7 +386,7 @@ class CsrfViewMiddleware(MiddlewareMixin):
token_source = 'POST'
try:
- _sanitize_token(request_csrf_token)
+ _check_token_format(request_csrf_token)
except InvalidTokenFormat as exc:
reason = self._bad_token_message(exc.reason, token_source)
raise RejectRequest(reason)