Skip to content

Commit 9c7e11a

Browse files
committed
properly ignoring anti-csrf in optional session validation
1 parent 817b8b2 commit 9c7e11a

File tree

2 files changed

+6
-2
lines changed

2 files changed

+6
-2
lines changed

recipe/session/sessionRequestFunctions.go

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -179,8 +179,12 @@ func GetSessionFromRequest(req *http.Request, res http.ResponseWriter, config se
179179
doAntiCsrfCheck = &doAntiCsrfCheckBool
180180
}
181181

182+
False := false
182183
if requestTokenTransferMethod != nil && *requestTokenTransferMethod == sessmodels.HeaderTransferMethod {
183-
False := false
184+
doAntiCsrfCheck = &False
185+
}
186+
187+
if accessToken == nil {
184188
doAntiCsrfCheck = &False
185189
}
186190

recipe/session/verifySession_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -968,7 +968,7 @@ func TestThatAntiCSRFCheckIsSkippedIfSessionRequiredIsFalseAndNoAccessTokenIsPas
968968
res, err := http.DefaultClient.Do(req)
969969
assert.Equal(t, res.StatusCode, 401)
970970

971-
req, err = http.NewRequest(http.MethodGet, app.URL+"/verify-optional", nil)
971+
req, err = http.NewRequest(http.MethodPost, app.URL+"/verify-optional", nil)
972972
assert.NoError(t, err)
973973

974974
res, err = http.DefaultClient.Do(req)

0 commit comments

Comments
 (0)