summaryrefslogtreecommitdiffstats
path: root/application/core
diff options
context:
space:
mode:
authorFlorian Pritz <bluewind@xinu.at>2016-09-27 19:08:30 +0200
committerFlorian Pritz <bluewind@xinu.at>2016-11-05 19:44:15 +0100
commita23efbcccf25804ea3a72637595865b240c157ad (patch)
tree40cf89ad5c0faabcab91048f8e73a168b6967d76 /application/core
parent8cfeb014b5255d0d79a9e2724462cd89d50e6aec (diff)
Rename is_cli_client to is_api_client
Signed-off-by: Florian Pritz <bluewind@xinu.at>
Diffstat (limited to 'application/core')
-rw-r--r--application/core/MY_Controller.php6
1 files changed, 3 insertions, 3 deletions
diff --git a/application/core/MY_Controller.php b/application/core/MY_Controller.php
index 078a4faa1..68ee302a9 100644
--- a/application/core/MY_Controller.php
+++ b/application/core/MY_Controller.php
@@ -45,10 +45,10 @@ class MY_Controller extends CI_Controller {
$this->load->helper(array('form', 'filebin'));
if ($this->uri->segment(1) == "api") {
- is_cli_client(true);
+ is_api_client(true);
}
- if ($this->input->post("apikey") !== false || is_cli_client()) {
+ if ($this->input->post("apikey") !== false || is_api_client()) {
/* This relies on the authentication code always verifying the supplied
* apikey. If the key is not verified/logged in an attacker could simply
* add an empty "apikey" field to the CSRF form to circumvent the
@@ -83,7 +83,7 @@ class MY_Controller extends CI_Controller {
$csrf_protection = false;
}
- if (is_cli_client() && in_array($uri_start, $csrf_whitelisted_handlers["cli_client"])) {
+ if (is_api_client() && in_array($uri_start, $csrf_whitelisted_handlers["cli_client"])) {
$csrf_protection = false;
}