diff options
author | Florian Pritz <bluewind@xinu.at> | 2016-09-27 19:08:30 +0200 |
---|---|---|
committer | Florian Pritz <bluewind@xinu.at> | 2016-11-01 17:29:04 +0100 |
commit | 39ec7b56cd022c125c44ca4acc33f8290f92731e (patch) | |
tree | f6bf0f46840f3c95f16928f4e1f9418d3b21953f /application/core/MY_Controller.php | |
parent | 554b2875114cc00d48b0820a7b01549102912ffe (diff) |
Rename is_cli_client to is_api_client
Signed-off-by: Florian Pritz <bluewind@xinu.at>
Diffstat (limited to 'application/core/MY_Controller.php')
-rw-r--r-- | application/core/MY_Controller.php | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/application/core/MY_Controller.php b/application/core/MY_Controller.php index 078a4faa1..68ee302a9 100644 --- a/application/core/MY_Controller.php +++ b/application/core/MY_Controller.php @@ -45,10 +45,10 @@ class MY_Controller extends CI_Controller { $this->load->helper(array('form', 'filebin')); if ($this->uri->segment(1) == "api") { - is_cli_client(true); + is_api_client(true); } - if ($this->input->post("apikey") !== false || is_cli_client()) { + if ($this->input->post("apikey") !== false || is_api_client()) { /* This relies on the authentication code always verifying the supplied * apikey. If the key is not verified/logged in an attacker could simply * add an empty "apikey" field to the CSRF form to circumvent the @@ -83,7 +83,7 @@ class MY_Controller extends CI_Controller { $csrf_protection = false; } - if (is_cli_client() && in_array($uri_start, $csrf_whitelisted_handlers["cli_client"])) { + if (is_api_client() && in_array($uri_start, $csrf_whitelisted_handlers["cli_client"])) { $csrf_protection = false; } |