aboutsummaryrefslogtreecommitdiffstats
path: root/lib/private/AppFramework/Middleware
diff options
context:
space:
mode:
authorRobin Appelman <robin@icewind.nl>2023-06-01 23:10:00 +0200
committerGitHub <noreply@github.com>2023-06-01 23:10:00 +0200
commit9f1d497a0b4dbda86e676a3a55758bc2909cc781 (patch)
tree968db9431470d4d0e1ea7c80caed373fc9029120 /lib/private/AppFramework/Middleware
parente81fdfefab6d46b9d326b70c278d52fbb941a431 (diff)
parentfa31c707c0a4c2a72141b8017e66561710185a06 (diff)
downloadnextcloud-server-9f1d497a0b4dbda86e676a3a55758bc2909cc781.tar.gz
nextcloud-server-9f1d497a0b4dbda86e676a3a55758bc2909cc781.zip
Merge pull request #38261 from fsamapoor/replace_strpos_calls_in_lib_private
Refactors "strpos" calls in lib/private to improve code readability.
Diffstat (limited to 'lib/private/AppFramework/Middleware')
-rw-r--r--lib/private/AppFramework/Middleware/CompressionMiddleware.php2
-rw-r--r--lib/private/AppFramework/Middleware/Security/SecurityMiddleware.php2
2 files changed, 2 insertions, 2 deletions
diff --git a/lib/private/AppFramework/Middleware/CompressionMiddleware.php b/lib/private/AppFramework/Middleware/CompressionMiddleware.php
index 530c270c7bc..b1b89832b00 100644
--- a/lib/private/AppFramework/Middleware/CompressionMiddleware.php
+++ b/lib/private/AppFramework/Middleware/CompressionMiddleware.php
@@ -57,7 +57,7 @@ class CompressionMiddleware extends Middleware {
// Check if we are even asked for gzip
$header = $this->request->getHeader('Accept-Encoding');
- if (strpos($header, 'gzip') === false) {
+ if (!str_contains($header, 'gzip')) {
return $response;
}
diff --git a/lib/private/AppFramework/Middleware/Security/SecurityMiddleware.php b/lib/private/AppFramework/Middleware/Security/SecurityMiddleware.php
index 8e0794f9645..04f79361bc8 100644
--- a/lib/private/AppFramework/Middleware/Security/SecurityMiddleware.php
+++ b/lib/private/AppFramework/Middleware/Security/SecurityMiddleware.php
@@ -218,7 +218,7 @@ class SecurityMiddleware extends Middleware {
if (!$this->request->passesCSRFCheck() && !(
$controller instanceof OCSController && (
$this->request->getHeader('OCS-APIREQUEST') === 'true' ||
- strpos($this->request->getHeader('Authorization'), 'Bearer ') === 0
+ str_starts_with($this->request->getHeader('Authorization'), 'Bearer ')
)
)) {
throw new CrossSiteRequestForgeryException();