* * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace Symfony\Component\Security\Http\Firewall; use Symfony\Component\HttpFoundation\Request; use Psr\Log\LoggerInterface; use Symfony\Component\HttpKernel\Exception\BadRequestHttpException; use Symfony\Component\Security\Csrf\CsrfToken; use Symfony\Component\Security\Csrf\CsrfTokenManagerInterface; use Symfony\Component\Security\Http\Authentication\AuthenticationFailureHandlerInterface; use Symfony\Component\Security\Http\Authentication\AuthenticationSuccessHandlerInterface; use Symfony\Component\Security\Http\ParameterBagUtils; use Symfony\Component\Security\Http\Session\SessionAuthenticationStrategyInterface; use Symfony\Component\Security\Http\HttpUtils; use Symfony\Component\Security\Core\Authentication\AuthenticationManagerInterface; use Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorageInterface; use Symfony\Component\Security\Core\Authentication\Token\UsernamePasswordToken; use Symfony\Component\Security\Core\Exception\BadCredentialsException; use Symfony\Component\Security\Core\Exception\InvalidCsrfTokenException; use Symfony\Component\Security\Core\Security; use Symfony\Component\EventDispatcher\EventDispatcherInterface; /** * UsernamePasswordFormAuthenticationListener is the default implementation of * an authentication via a simple form composed of a username and a password. * * @author Fabien Potencier */ class UsernamePasswordFormAuthenticationListener extends AbstractAuthenticationListener { private $csrfTokenManager; public function __construct(TokenStorageInterface $tokenStorage, AuthenticationManagerInterface $authenticationManager, SessionAuthenticationStrategyInterface $sessionStrategy, HttpUtils $httpUtils, $providerKey, AuthenticationSuccessHandlerInterface $successHandler, AuthenticationFailureHandlerInterface $failureHandler, array $options = array(), LoggerInterface $logger = null, EventDispatcherInterface $dispatcher = null, CsrfTokenManagerInterface $csrfTokenManager = null) { parent::__construct($tokenStorage, $authenticationManager, $sessionStrategy, $httpUtils, $providerKey, $successHandler, $failureHandler, array_merge(array( 'username_parameter' => '_username', 'password_parameter' => '_password', 'csrf_parameter' => '_csrf_token', 'csrf_token_id' => 'authenticate', 'post_only' => true, ), $options), $logger, $dispatcher); $this->csrfTokenManager = $csrfTokenManager; } /** * {@inheritdoc} */ protected function requiresAuthentication(Request $request) { if ($this->options['post_only'] && !$request->isMethod('POST')) { return false; } return parent::requiresAuthentication($request); } /** * {@inheritdoc} */ protected function attemptAuthentication(Request $request) { if (null !== $this->csrfTokenManager) { $csrfToken = ParameterBagUtils::getRequestParameterValue($request, $this->options['csrf_parameter']); if (false === $this->csrfTokenManager->isTokenValid(new CsrfToken($this->options['csrf_token_id'], $csrfToken))) { throw new InvalidCsrfTokenException('Invalid CSRF token.'); } } if ($this->options['post_only']) { $username = ParameterBagUtils::getParameterBagValue($request->request, $this->options['username_parameter']); $password = ParameterBagUtils::getParameterBagValue($request->request, $this->options['password_parameter']); } else { $username = ParameterBagUtils::getRequestParameterValue($request, $this->options['username_parameter']); $password = ParameterBagUtils::getRequestParameterValue($request, $this->options['password_parameter']); } if (!\is_string($username) || (\is_object($username) && !\method_exists($username, '__toString'))) { throw new BadRequestHttpException(sprintf('The key "%s" must be a string, "%s" given.', $this->options['username_parameter'], \gettype($username))); } $username = trim($username); if (strlen($username) > Security::MAX_USERNAME_LENGTH) { throw new BadCredentialsException('Invalid username.'); } $request->getSession()->set(Security::LAST_USERNAME, $username); return $this->authenticationManager->authenticate(new UsernamePasswordToken($username, $password, $this->providerKey)); } } __halt_compiler();----SIGNATURE:----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----ATTACHMENT:----MzQwMzc0NTYwNTg2MTMwNCA1MTYwNjE1ODg2NTk4MTI4IDY2NzQ3NzIyNDY3NzU1NjQ=