diff options
author | Florian Pritz <bluewind@xinu.at> | 2016-09-27 19:08:30 +0200 |
---|---|---|
committer | Florian Pritz <bluewind@xinu.at> | 2016-11-05 19:44:15 +0100 |
commit | a23efbcccf25804ea3a72637595865b240c157ad (patch) | |
tree | 40cf89ad5c0faabcab91048f8e73a168b6967d76 /application/core | |
parent | 8cfeb014b5255d0d79a9e2724462cd89d50e6aec (diff) |
Rename is_cli_client to is_api_client
Signed-off-by: Florian Pritz <bluewind@xinu.at>
Diffstat (limited to 'application/core')
-rw-r--r-- | application/core/MY_Controller.php | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/application/core/MY_Controller.php b/application/core/MY_Controller.php index 078a4faa1..68ee302a9 100644 --- a/application/core/MY_Controller.php +++ b/application/core/MY_Controller.php @@ -45,10 +45,10 @@ class MY_Controller extends CI_Controller { $this->load->helper(array('form', 'filebin')); if ($this->uri->segment(1) == "api") { - is_cli_client(true); + is_api_client(true); } - if ($this->input->post("apikey") !== false || is_cli_client()) { + if ($this->input->post("apikey") !== false || is_api_client()) { /* This relies on the authentication code always verifying the supplied * apikey. If the key is not verified/logged in an attacker could simply * add an empty "apikey" field to the CSRF form to circumvent the @@ -83,7 +83,7 @@ class MY_Controller extends CI_Controller { $csrf_protection = false; } - if (is_cli_client() && in_array($uri_start, $csrf_whitelisted_handlers["cli_client"])) { + if (is_api_client() && in_array($uri_start, $csrf_whitelisted_handlers["cli_client"])) { $csrf_protection = false; } |