Rename bad chars property to filename_bad_chars, remove the setter and add changelog entry
diff --git a/system/core/Security.php b/system/core/Security.php
index 3d04d5e..70cf3e0 100644
--- a/system/core/Security.php
+++ b/system/core/Security.php
@@ -42,7 +42,7 @@
*
* @var array
*/
- public $sanitize_filename_str = array(
+ public $filename_bad_chars = array(
'../', '<!--', '-->', '<', '>',
"'", '"', '&', '$', '#',
'{', '}', '[', ']', '=',
@@ -565,19 +565,6 @@
// --------------------------------------------------------------------
/**
- * Set Sanitize Filename Strings
- *
- * @param array $strings
- * @return void
- */
- public function set_sanitize_filename_str($strings)
- {
- $this->sanitize_filename_str = $strings;
- }
-
- // --------------------------------------------------------------------
-
- /**
* Sanitize Filename
*
* @param string $str Input file name
@@ -586,7 +573,7 @@
*/
public function sanitize_filename($str, $relative_path = FALSE)
{
- $bad = $this->sanitize_filename_str;
+ $bad = $this->filename_bad_chars;
if ( ! $relative_path)
{
diff --git a/user_guide_src/source/changelog.rst b/user_guide_src/source/changelog.rst
index 4cef0e6..fd1ce2d 100644
--- a/user_guide_src/source/changelog.rst
+++ b/user_guide_src/source/changelog.rst
@@ -416,6 +416,7 @@
- Added method ``strip_image_tags()``.
- Added ``$config['csrf_regeneration']``, which makes token regeneration optional.
- Added ``$config['csrf_exclude_uris']``, which allows you list URIs which will not have the CSRF validation methods run.
+ - Changed ``sanitize_filename()``, makes filename_bad_chars a public property.
- :doc:`URI Routing <general/routing>` changes include: