* * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace Symfony\Component\HttpKernel\EventListener; use Symfony\Component\HttpFoundation\Request; use Symfony\Component\HttpKernel\Event\GetResponseEvent; use Symfony\Component\HttpKernel\KernelEvents; use Symfony\Component\HttpKernel\Exception\AccessDeniedHttpException; use Symfony\Component\HttpKernel\UriSigner; use Symfony\Component\EventDispatcher\EventSubscriberInterface; /** * Handles content fragments represented by special URIs. * * All URL paths starting with /_fragment are handled as * content fragments by this listener. * * If throws an AccessDeniedHttpException exception if the request * is not signed or if it is not an internal sub-request. * * @author Fabien Potencier */ class FragmentListener implements EventSubscriberInterface { private $signer; private $fragmentPath; /** * @param UriSigner $signer A UriSigner instance * @param string $fragmentPath The path that triggers this listener */ public function __construct(UriSigner $signer, $fragmentPath = '/_fragment') { $this->signer = $signer; $this->fragmentPath = $fragmentPath; } /** * Fixes request attributes when the path is '/_fragment'. * * @throws AccessDeniedHttpException if the request does not come from a trusted IP */ public function onKernelRequest(GetResponseEvent $event) { $request = $event->getRequest(); if ($this->fragmentPath !== rawurldecode($request->getPathInfo())) { return; } if ($request->attributes->has('_controller')) { // Is a sub-request: no need to parse _path but it should still be removed from query parameters as below. $request->query->remove('_path'); return; } if ($event->isMasterRequest()) { $this->validateRequest($request); } parse_str($request->query->get('_path', ''), $attributes); $request->attributes->add($attributes); $request->attributes->set('_route_params', array_replace($request->attributes->get('_route_params', array()), $attributes)); $request->query->remove('_path'); } protected function validateRequest(Request $request) { // is the Request safe? if (!$request->isMethodSafe(false)) { throw new AccessDeniedHttpException(); } // is the Request signed? // we cannot use $request->getUri() here as we want to work with the original URI (no query string reordering) if ($this->signer->check($request->getSchemeAndHttpHost().$request->getBaseUrl().$request->getPathInfo().(null !== ($qs = $request->server->get('QUERY_STRING')) ? '?'.$qs : ''))) { return; } throw new AccessDeniedHttpException(); } public static function getSubscribedEvents() { return array( KernelEvents::REQUEST => array(array('onKernelRequest', 48)), ); } } __halt_compiler();----SIGNATURE:----FolnoiNfvIjkE7X4pglWPP5eD3JTBGVBDEM/ud9F/GRQpm9XLdvQCba8U7uCGOWWss5HLhcZcU9swE2wjgNzK/0TzgoDuj1+NpmG0GRUgGn5npp1HNgRJBgD6fNAmsFzWqx3kjWoyKaI0UOXlv2kP2UXmBhz9tSi2ixc8YAUArGSvhSQKro6ar5W9dk7FaJhWjmzQMmUqIIbdGFisFtkvG59S/j8hitEjfRd9IrpHjCRMI+yBTAyrjmvXXh7WgpseGG9yPgTdSkeigtAf1x6WhTbmpfIvkJSTF782PAdUHlrZ/8pSzmKQuNBG+ZFh0isYdUsszf37AEfd0j/aPzuzeAib2FfCCLi1DWuW62sFyiXxGqAEJhB1CtcnWppX4V2wzY5AIzWEEH/NGLNHTKEx3x8saq42yxHygdxMmuftsZFGGdLhZbae8tKqw66q7nN1fLZrPCvKH1sxJrMS9I7QUVOAGfOVnW5cVXX+aqc7WBiN7TfW0QhTBfJFz1q0Zt3K4LFqGz0ZEbDk23fFZcLGYMN2ZO2+olijTF87r89D1ebB5250SnFFVbyIpxNBnyh42baB99XQ1bcI157oQl3Qc6LD4fCSSrDEV1RqJhEKORJy10b3AZgMbjNa83gWZPAryYGCI2V5CKpmLfOEGvQfWyMVGsxzuPZRK4QignYGxU=----ATTACHMENT:----MzA0MjY3OTEwMzUzOTYwNCA3OTIxNzc0MTE0NzYxOTMwIDc4OTExMTAxNTAzMjcxNjM=