respect token validation mode for CSRF header

Fixes #1104

Signed-off-by: Nicola Murino <nicola.murino@gmail.com>
This commit is contained in:
Nicola Murino
2022-12-16 19:14:56 +01:00
parent 2da3eabc12
commit 147ad3b230

View File

@@ -305,11 +305,13 @@ func verifyCSRFHeader(next http.Handler) http.Handler {
return return
} }
if tokenValidationMode != tokenValidationNoIPMatch {
if !util.Contains(token.Audience(), util.GetIPFromRemoteAddress(r.RemoteAddr)) { if !util.Contains(token.Audience(), util.GetIPFromRemoteAddress(r.RemoteAddr)) {
logger.Debug(logSender, "", "error validating CSRF header IP audience") logger.Debug(logSender, "", "error validating CSRF header IP audience")
sendAPIResponse(w, r, errors.New("the token is not valid"), "", http.StatusForbidden) sendAPIResponse(w, r, errors.New("the token is not valid"), "", http.StatusForbidden)
return return
} }
}
next.ServeHTTP(w, r) next.ServeHTTP(w, r)
}) })