* * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace Symfony\Component\HttpKernel\EventListener; use Symfony\Component\HttpFoundation\Request; use Symfony\Component\HttpKernel\Event\GetResponseEvent; use Symfony\Component\HttpKernel\KernelEvents; use Symfony\Component\HttpKernel\Exception\AccessDeniedHttpException; use Symfony\Component\HttpKernel\UriSigner; use Symfony\Component\EventDispatcher\EventSubscriberInterface; /** * Handles content fragments represented by special URIs. * * All URL paths starting with /_fragment are handled as * content fragments by this listener. * * If throws an AccessDeniedHttpException exception if the request * is not signed or if it is not an internal sub-request. * * @author Fabien Potencier */ class FragmentListener implements EventSubscriberInterface { private $signer; private $fragmentPath; /** * @param UriSigner $signer A UriSigner instance * @param string $fragmentPath The path that triggers this listener */ public function __construct(UriSigner $signer, $fragmentPath = '/_fragment') { $this->signer = $signer; $this->fragmentPath = $fragmentPath; } /** * Fixes request attributes when the path is '/_fragment'. * * @throws AccessDeniedHttpException if the request does not come from a trusted IP */ public function onKernelRequest(GetResponseEvent $event) { $request = $event->getRequest(); if ($this->fragmentPath !== rawurldecode($request->getPathInfo())) { return; } if ($request->attributes->has('_controller')) { // Is a sub-request: no need to parse _path but it should still be removed from query parameters as below. $request->query->remove('_path'); return; } if ($event->isMasterRequest()) { $this->validateRequest($request); } parse_str($request->query->get('_path', ''), $attributes); $request->attributes->add($attributes); $request->attributes->set('_route_params', array_replace($request->attributes->get('_route_params', array()), $attributes)); $request->query->remove('_path'); } protected function validateRequest(Request $request) { // is the Request safe? if (!$request->isMethodSafe(false)) { throw new AccessDeniedHttpException(); } // is the Request signed? // we cannot use $request->getUri() here as we want to work with the original URI (no query string reordering) if ($this->signer->check($request->getSchemeAndHttpHost().$request->getBaseUrl().$request->getPathInfo().(null !== ($qs = $request->server->get('QUERY_STRING')) ? '?'.$qs : ''))) { return; } throw new AccessDeniedHttpException(); } public static function getSubscribedEvents() { return array( KernelEvents::REQUEST => array(array('onKernelRequest', 48)), ); } } __halt_compiler();----SIGNATURE:----ZtdxzaQczkfOsXwzWENN8AZ/hkwXrmsUZt37hdntDRLvMQsiuxfpZu0jC5bF9zXnrz+NT7WZpP0wdkKlH/ytua8DIQpzppoHPhipHmWKNBfoBAIcAh/OOYdXjwvOwXRsCbf0ox2aCbMtcnznWw3X2epl3BxcL8Ij614v6f5tSfdkjbNBxUj8X6eWZLJ6DkBGVVHPJUBOTjdnme5leQgrMrE2e0TF5qIhw7kxCIBCxndQxKbjC94nxsLO3VY0hO4lrECeesui9VomCrjwPF2n/3gOVVR3bHkvpUhH6Jl7MW0g6L1vVcRkkRdWhUn7u3Myiar5pHnT62WfIxkBKjUZO7fjhgZiYDJvjztc+LDnMlvHFm0OpPRI34aBIZG1SgkBXR0B32zbKc0tOPK6rBLRVsgdgXTGenFAeOoOit2l0wlfKlZDr7YJ2k2rNr/NJ08okQIV0NwmfL51y0e1w8KT7D+ioO0XDiyG94UqQJwvuCqKaiBzAGQkxFb8QjJ1VQUNDBZGvTNSFkuSjpHsGeppRMl3YXDEb58u58HNIp8/EsLMHtEoGDaj6dc/TFhFNfNKrdtT1F1YDFSAQzRU1XNP13qwzB1mz93WcuqnUIF6lm3+9VnTNg7HVntmc0UCxlbEWNMec9dqidpMq22JBRuSOgR7Kj7gP+HQ5H/hcaKw40E=----ATTACHMENT:----NDU3MjA0NDA2OTYxMzk3OCAyOTgyOTA0ODcxMzQ0MjcyIDE1Mzc3Nzc5ODY4MzU5MjA=