From 086ba796aa4ad5afc89889c011513e0e5e8da3b9 Mon Sep 17 00:00:00 2001 From: Awilum Date: Fri, 16 Jul 2021 17:18:40 +0300 Subject: [PATCH] feat(middlewares): update csrf middleware --- src/flextype/Middlewares/CsrfMiddleware.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/flextype/Middlewares/CsrfMiddleware.php b/src/flextype/Middlewares/CsrfMiddleware.php index a4f1983d..c4825cd7 100644 --- a/src/flextype/Middlewares/CsrfMiddleware.php +++ b/src/flextype/Middlewares/CsrfMiddleware.php @@ -23,10 +23,10 @@ class CsrfMiddleware */ public function __invoke(Request $request, Response $response, callable $next) : Response { - $post_data = $request->getParsedBody(); + $data = $request->getParsedBody(); - if (isset($post_data[flextype('csrf')->getTokenName()])) { - if (flextype('csrf')->isValid($post_data[flextype('csrf')->getTokenName()])) { + if (isset($data[flextype('csrf')->getTokenName()])) { + if (flextype('csrf')->isValid($data[flextype('csrf')->getTokenName()])) { $response = $next($request, $response); } else { die('This looks like a cross-site request forgery!');