| Total Complexity | 90 |
| Total Lines | 601 |
| Duplicated Lines | 0 % |
| Changes | 0 | ||
Complex classes like Input often do a lot of different things. To break such a class down, we need to identify a cohesive component within that class. A common approach to find such a component is to look for fields/methods that share the same prefixes, or suffixes.
Once you have determined the fields that belong together, you can apply the Extract Class refactoring. If the component makes sense as a sub-class, Extract Subclass is also a candidate, and is often faster.
While breaking up the class, it is a good idea to analyze how other classes use Input, and based on these observations, apply Extract Interface, too.
| 1 | <?php |
||
| 35 | class Input |
||
| 36 | { |
||
| 37 | /** |
||
| 38 | * Input::__construct |
||
| 39 | */ |
||
| 40 | public function __construct() |
||
| 41 | { |
||
| 42 | // Turn register_globals off. |
||
| 43 | if ( ! ini_get('register_globals')) { |
||
| 44 | return; |
||
| 45 | } |
||
| 46 | |||
| 47 | if (isset($_REQUEST[ 'GLOBALS' ])) { |
||
| 48 | die('GLOBALS overwrite attempt detected'); |
||
|
|
|||
| 49 | } |
||
| 50 | |||
| 51 | // Variables that shouldn't be unset |
||
| 52 | $no_unset = ['GLOBALS', '_GET', '_POST', '_COOKIE', '_REQUEST', '_SERVER', '_ENV', '_FILES', 'table_prefix']; |
||
| 53 | |||
| 54 | $input = array_merge($_GET, $_POST, $_COOKIE, $_SERVER, $_ENV, $_FILES, |
||
| 55 | isset($_SESSION) && is_array($_SESSION) ? $_SESSION : []); |
||
| 56 | foreach ($input as $k => $v) { |
||
| 57 | if ( ! in_array($k, $no_unset) && isset($GLOBALS[ $k ])) { |
||
| 58 | unset($GLOBALS[ $k ]); |
||
| 59 | } |
||
| 60 | } |
||
| 61 | |||
| 62 | // Standardize $_SERVER variables across setups. |
||
| 63 | $default_server_values = [ |
||
| 64 | 'SERVER_SOFTWARE' => '', |
||
| 65 | 'REQUEST_URI' => '', |
||
| 66 | ]; |
||
| 67 | |||
| 68 | $_SERVER = array_merge($default_server_values, $_SERVER); |
||
| 69 | |||
| 70 | // Fix for IIS when running with PHP ISAPI |
||
| 71 | if (empty($_SERVER[ 'REQUEST_URI' ]) || (PHP_SAPI != 'cgi-fcgi' && preg_match('/^Microsoft-IIS\//', |
||
| 72 | $_SERVER[ 'SERVER_SOFTWARE' ]))) { |
||
| 73 | |||
| 74 | if (isset($_SERVER[ 'HTTP_X_ORIGINAL_URL' ])) { |
||
| 75 | // IIS Mod-Rewrite |
||
| 76 | $_SERVER[ 'REQUEST_URI' ] = $_SERVER[ 'HTTP_X_ORIGINAL_URL' ]; |
||
| 77 | } elseif (isset($_SERVER[ 'HTTP_X_REWRITE_URL' ])) { |
||
| 78 | // IIS Isapi_Rewrite |
||
| 79 | $_SERVER[ 'REQUEST_URI' ] = $_SERVER[ 'HTTP_X_REWRITE_URL' ]; |
||
| 80 | } else { |
||
| 81 | // Use ORIG_PATH_INFO if there is no PATH_INFO |
||
| 82 | if ( ! isset($_SERVER[ 'PATH_INFO' ]) && isset($_SERVER[ 'ORIG_PATH_INFO' ])) { |
||
| 83 | $_SERVER[ 'PATH_INFO' ] = $_SERVER[ 'ORIG_PATH_INFO' ]; |
||
| 84 | } |
||
| 85 | |||
| 86 | // Some IIS + PHP configurations puts the script-name in the path-info (No need to append it twice) |
||
| 87 | if (isset($_SERVER[ 'PATH_INFO' ])) { |
||
| 88 | if ($_SERVER[ 'PATH_INFO' ] == $_SERVER[ 'SCRIPT_NAME' ]) { |
||
| 89 | $_SERVER[ 'REQUEST_URI' ] = $_SERVER[ 'PATH_INFO' ]; |
||
| 90 | } else { |
||
| 91 | $_SERVER[ 'REQUEST_URI' ] = $_SERVER[ 'SCRIPT_NAME' ] . $_SERVER[ 'PATH_INFO' ]; |
||
| 92 | } |
||
| 93 | } |
||
| 94 | |||
| 95 | // Append the query string if it exists and isn't null |
||
| 96 | if ( ! empty($_SERVER[ 'QUERY_STRING' ])) { |
||
| 97 | $_SERVER[ 'REQUEST_URI' ] .= '?' . $_SERVER[ 'QUERY_STRING' ]; |
||
| 98 | } |
||
| 99 | } |
||
| 100 | } |
||
| 101 | |||
| 102 | // Fix for PHP as CGI hosts that set SCRIPT_FILENAME to something ending in php.cgi for all requests |
||
| 103 | if (isset($_SERVER[ 'SCRIPT_FILENAME' ]) && (strpos($_SERVER[ 'SCRIPT_FILENAME' ], |
||
| 104 | 'php.cgi') == strlen($_SERVER[ 'SCRIPT_FILENAME' ]) - 7)) { |
||
| 105 | $_SERVER[ 'SCRIPT_FILENAME' ] = $_SERVER[ 'PATH_TRANSLATED' ]; |
||
| 106 | } |
||
| 107 | |||
| 108 | // Fix for Dreamhost and other PHP as CGI hosts |
||
| 109 | if (strpos($_SERVER[ 'SCRIPT_NAME' ], 'php.cgi') !== false) { |
||
| 110 | unset($_SERVER[ 'PATH_INFO' ]); |
||
| 111 | } |
||
| 112 | |||
| 113 | // Fix empty PHP_SELF |
||
| 114 | if (empty($PHP_SELF)) { |
||
| 115 | $_SERVER[ 'PHP_SELF' ] = $PHP_SELF = preg_replace('/(\?.*)?$/', '', $_SERVER[ 'REQUEST_URI' ]); |
||
| 116 | } |
||
| 117 | } |
||
| 118 | |||
| 119 | // ------------------------------------------------------------------------ |
||
| 120 | |||
| 121 | /** |
||
| 122 | * Input::getPost |
||
| 123 | * |
||
| 124 | * Fetch input from GET data with fallback to POST. |
||
| 125 | * |
||
| 126 | * @param string|null $offset The offset of $_GET or $_POST variable to fetch. |
||
| 127 | * When set null will returns filtered $_GET or $_POST variable. |
||
| 128 | * @param int $filter The ID of the filter to apply. |
||
| 129 | * The Types of filters manual page lists the available filters. |
||
| 130 | * If omitted, FILTER_DEFAULT will be used, which is equivalent to FILTER_UNSAFE_RAW. |
||
| 131 | * This will result in no filtering taking place by default. |
||
| 132 | * |
||
| 133 | * @return mixed |
||
| 134 | */ |
||
| 135 | final public function getPost($offset, $filter = null) |
||
| 136 | { |
||
| 137 | // Use $_GET directly here, since filter_has_var only |
||
| 138 | // checks the initial GET data, not anything that might |
||
| 139 | // have been added since. |
||
| 140 | return isset($_GET[ $offset ]) |
||
| 141 | ? $this->get($offset, $filter) |
||
| 142 | : $this->post($offset, $filter); |
||
| 143 | } |
||
| 144 | |||
| 145 | // ------------------------------------------------------------------------ |
||
| 146 | |||
| 147 | /** |
||
| 148 | * Input::get |
||
| 149 | * |
||
| 150 | * Fetch input from GET data. |
||
| 151 | * |
||
| 152 | * @param string|null $offset The offset of $_GET variable to fetch. |
||
| 153 | * When set null will returns filtered $_GET variable. |
||
| 154 | * @param int $filter The ID of the filter to apply. |
||
| 155 | * The Types of filters manual page lists the available filters. |
||
| 156 | * If omitted, FILTER_DEFAULT will be used, which is equivalent to FILTER_UNSAFE_RAW. |
||
| 157 | * This will result in no filtering taking place by default. |
||
| 158 | * |
||
| 159 | * @return mixed |
||
| 160 | */ |
||
| 161 | final public function get($offset = null, $filter = null) |
||
| 162 | { |
||
| 163 | return $this->filter(INPUT_GET, $offset, $filter); |
||
| 164 | } |
||
| 165 | |||
| 166 | // ------------------------------------------------------------------------ |
||
| 167 | |||
| 168 | /** |
||
| 169 | * Input::filter |
||
| 170 | * |
||
| 171 | * Gets a specific external variable by name and optionally filters it. |
||
| 172 | * |
||
| 173 | * @see http://php.net/manual/en/function.filter-input.php |
||
| 174 | * |
||
| 175 | * @param int $type One of INPUT_GET, INPUT_POST, INPUT_COOKIE, INPUT_SERVER, or INPUT_ENV. |
||
| 176 | * @param mixed $offset The offset key of input variable. |
||
| 177 | * @param int $filter The ID of the filter to apply. |
||
| 178 | * The Types of filters manual page lists the available filters. |
||
| 179 | * If omitted, FILTER_DEFAULT will be used, which is equivalent to FILTER_UNSAFE_RAW. |
||
| 180 | * This will result in no filtering taking place by default. |
||
| 181 | * |
||
| 182 | * @return mixed|\O2System\Spl\DataStructures\SplArrayObject |
||
| 183 | */ |
||
| 184 | protected function filter($type, $offset = null, $filter = FILTER_DEFAULT) |
||
| 185 | { |
||
| 186 | // If $offset is null, it means that the whole input type array is requested |
||
| 187 | if (is_null($offset)) { |
||
| 188 | $loopThrough = []; |
||
| 189 | |||
| 190 | switch ($type) { |
||
| 191 | case INPUT_GET : |
||
| 192 | $loopThrough = $_GET; |
||
| 193 | break; |
||
| 194 | case INPUT_POST : |
||
| 195 | $loopThrough = $_POST; |
||
| 196 | break; |
||
| 197 | case INPUT_COOKIE : |
||
| 198 | $loopThrough = $_COOKIE; |
||
| 199 | break; |
||
| 200 | case INPUT_SERVER : |
||
| 201 | $loopThrough = $_SERVER; |
||
| 202 | break; |
||
| 203 | case INPUT_ENV : |
||
| 204 | $loopThrough = $_ENV; |
||
| 205 | break; |
||
| 206 | case INPUT_REQUEST : |
||
| 207 | $loopThrough = $_REQUEST; |
||
| 208 | break; |
||
| 209 | case INPUT_SESSION : |
||
| 210 | $loopThrough = $_ENV; |
||
| 211 | break; |
||
| 212 | } |
||
| 213 | |||
| 214 | $loopThrough = $this->filterRecursive($loopThrough, $filter); |
||
| 215 | |||
| 216 | if (empty($loopThrough)) { |
||
| 217 | return false; |
||
| 218 | } |
||
| 219 | |||
| 220 | return new SplArrayObject($loopThrough); |
||
| 221 | } // allow fetching multiple keys at once |
||
| 222 | elseif (is_array($offset)) { |
||
| 223 | $loopThrough = []; |
||
| 224 | |||
| 225 | foreach ($offset as $key) { |
||
| 226 | $loopThrough[ $key ] = $this->filter($type, $key, $filter); |
||
| 227 | } |
||
| 228 | |||
| 229 | if (empty($loopThrough)) { |
||
| 230 | return false; |
||
| 231 | } |
||
| 232 | |||
| 233 | return new SplArrayObject($loopThrough); |
||
| 234 | } elseif (isset($offset)) { |
||
| 235 | // Due to issues with FastCGI and testing, |
||
| 236 | // we need to do these all manually instead |
||
| 237 | // of the simpler filter_input(); |
||
| 238 | switch ($type) { |
||
| 239 | case INPUT_GET: |
||
| 240 | $value = isset($_GET[ $offset ]) |
||
| 241 | ? $_GET[ $offset ] |
||
| 242 | : null; |
||
| 243 | break; |
||
| 244 | case INPUT_POST: |
||
| 245 | $value = isset($_POST[ $offset ]) |
||
| 246 | ? $_POST[ $offset ] |
||
| 247 | : null; |
||
| 248 | break; |
||
| 249 | case INPUT_SERVER: |
||
| 250 | $value = isset($_SERVER[ $offset ]) |
||
| 251 | ? $_SERVER[ $offset ] |
||
| 252 | : null; |
||
| 253 | break; |
||
| 254 | case INPUT_ENV: |
||
| 255 | $value = isset($_ENV[ $offset ]) |
||
| 256 | ? $_ENV[ $offset ] |
||
| 257 | : null; |
||
| 258 | break; |
||
| 259 | case INPUT_COOKIE: |
||
| 260 | $value = isset($_COOKIE[ $offset ]) |
||
| 261 | ? $_COOKIE[ $offset ] |
||
| 262 | : null; |
||
| 263 | break; |
||
| 264 | case INPUT_REQUEST: |
||
| 265 | $value = isset($_REQUEST[ $offset ]) |
||
| 266 | ? $_REQUEST[ $offset ] |
||
| 267 | : null; |
||
| 268 | break; |
||
| 269 | case INPUT_SESSION: |
||
| 270 | $value = isset($_SESSION[ $offset ]) |
||
| 271 | ? $_SESSION[ $offset ] |
||
| 272 | : null; |
||
| 273 | break; |
||
| 274 | default: |
||
| 275 | $value = ''; |
||
| 276 | } |
||
| 277 | |||
| 278 | if (is_array($value)) { |
||
| 279 | $value = $this->filterRecursive($value, $filter); |
||
| 280 | |||
| 281 | if (is_string(key($value))) { |
||
| 282 | return new SplArrayObject($value); |
||
| 283 | } else { |
||
| 284 | return $value; |
||
| 285 | } |
||
| 286 | } elseif (is_object($value)) { |
||
| 287 | return $value; |
||
| 288 | } |
||
| 289 | |||
| 290 | if (isset($filter)) { |
||
| 291 | return filter_var($value, $filter); |
||
| 292 | } |
||
| 293 | |||
| 294 | return $value; |
||
| 295 | } |
||
| 296 | |||
| 297 | return null; |
||
| 298 | } |
||
| 299 | |||
| 300 | // ------------------------------------------------------------------------ |
||
| 301 | |||
| 302 | /** |
||
| 303 | * Input::filterRecursive |
||
| 304 | * |
||
| 305 | * Gets multiple variables and optionally filters them. |
||
| 306 | * |
||
| 307 | * @see http://php.net/manual/en/function.filter-var.php |
||
| 308 | * @see http://php.net/manual/en/function.filter-var-array.php |
||
| 309 | * |
||
| 310 | * |
||
| 311 | * @param array $data An array with string keys containing the data to filter. |
||
| 312 | * @param int|mixed $filter The ID of the filter to apply. |
||
| 313 | * The Types of filters manual page lists the available filters. |
||
| 314 | * If omitted, FILTER_DEFAULT will be used, which is equivalent to FILTER_UNSAFE_RAW. |
||
| 315 | * This will result in no filtering taking place by default. |
||
| 316 | * Its also can be An array defining the arguments. |
||
| 317 | * A valid key is a string containing a variable name and a valid value is either |
||
| 318 | * a filter type, or an array optionally specifying the filter, flags and options. |
||
| 319 | * If the value is an array, valid keys are filter which specifies the filter type, |
||
| 320 | * flags which specifies any flags that apply to the filter, and options which |
||
| 321 | * specifies any options that apply to the filter. See the example below for |
||
| 322 | * a better understanding. |
||
| 323 | * |
||
| 324 | * @return mixed |
||
| 325 | */ |
||
| 326 | protected function filterRecursive(array $data, $filter = FILTER_DEFAULT) |
||
| 327 | { |
||
| 328 | foreach ($data as $key => $value) { |
||
| 329 | if (is_array($value) AND is_array($filter)) { |
||
| 330 | $data[ $key ] = filter_var_array($value, $filter); |
||
| 331 | } elseif (is_array($value)) { |
||
| 332 | $data[ $key ] = $this->filterRecursive($value, $filter); |
||
| 333 | } elseif (isset($filter)) { |
||
| 334 | $data[ $key ] = filter_var($value, $filter); |
||
| 335 | } else { |
||
| 336 | $data[ $key ] = $value; |
||
| 337 | } |
||
| 338 | } |
||
| 339 | |||
| 340 | return $data; |
||
| 341 | } |
||
| 342 | |||
| 343 | // ------------------------------------------------------------------------ |
||
| 344 | |||
| 345 | /** |
||
| 346 | * Input::post |
||
| 347 | * |
||
| 348 | * Fetch input from POST data. |
||
| 349 | * |
||
| 350 | * @param string|null $offset The offset of $_POST variable to fetch. |
||
| 351 | * When set null will returns filtered $_POST variable. |
||
| 352 | * @param int $filter The ID of the filter to apply. |
||
| 353 | * The Types of filters manual page lists the available filters. |
||
| 354 | * If omitted, FILTER_DEFAULT will be used, which is equivalent to FILTER_UNSAFE_RAW. |
||
| 355 | * This will result in no filtering taking place by default. |
||
| 356 | * |
||
| 357 | * @return mixed |
||
| 358 | */ |
||
| 359 | final public function post($offset = null, $filter = null) |
||
| 360 | { |
||
| 361 | return $this->filter(INPUT_POST, $offset, $filter); |
||
| 362 | } |
||
| 363 | |||
| 364 | // ------------------------------------------------------------------------ |
||
| 365 | |||
| 366 | /** |
||
| 367 | * Input::getPost |
||
| 368 | * |
||
| 369 | * Fetch input from POST data with fallback to GET. |
||
| 370 | * |
||
| 371 | * @param string|null $offset The offset of $_POST or $_GET variable to fetch. |
||
| 372 | * When set null will returns filtered $_POST or $_GET variable. |
||
| 373 | * @param int $filter The ID of the filter to apply. |
||
| 374 | * The Types of filters manual page lists the available filters. |
||
| 375 | * If omitted, FILTER_DEFAULT will be used, which is equivalent to FILTER_UNSAFE_RAW. |
||
| 376 | * This will result in no filtering taking place by default. |
||
| 377 | * |
||
| 378 | * @return mixed |
||
| 379 | */ |
||
| 380 | final public function postGet($offset, $filter = null) |
||
| 381 | { |
||
| 382 | // Use $_POST directly here, since filter_has_var only |
||
| 383 | // checks the initial POST data, not anything that might |
||
| 384 | // have been added since. |
||
| 385 | return isset($_POST[ $offset ]) |
||
| 386 | ? $this->post($offset, $filter) |
||
| 387 | : $this->get($offset, $filter); |
||
| 388 | } |
||
| 389 | |||
| 390 | //-------------------------------------------------------------------- |
||
| 391 | |||
| 392 | /** |
||
| 393 | * Input::files |
||
| 394 | * |
||
| 395 | * Fetch input from FILES data. Returns an array of all files that have been uploaded with this |
||
| 396 | * request. Each file is represented by an UploadedFileInterface instance. |
||
| 397 | * |
||
| 398 | * @param string|null $offset The offset of $_FILES variable to fetch. |
||
| 399 | * When set null will returns filtered $_FILES variable. |
||
| 400 | * |
||
| 401 | * @return array|UploadedFileInterface |
||
| 402 | */ |
||
| 403 | final public function files($offset = null) |
||
| 414 | } |
||
| 415 | |||
| 416 | //-------------------------------------------------------------------- |
||
| 417 | |||
| 418 | /** |
||
| 419 | * Input::env |
||
| 420 | * |
||
| 421 | * Fetch input from ENV data. |
||
| 422 | * |
||
| 423 | * @param string|null $offset The offset of $_ENV variable to fetch. |
||
| 424 | * When set null will returns filtered $_ENV variable. |
||
| 425 | * @param int $filter The ID of the filter to apply. |
||
| 426 | * The Types of filters manual page lists the available filters. |
||
| 427 | * If omitted, FILTER_DEFAULT will be used, which is equivalent to FILTER_UNSAFE_RAW. |
||
| 428 | * This will result in no filtering taking place by default. |
||
| 429 | * |
||
| 430 | * @return mixed |
||
| 431 | */ |
||
| 432 | final public function env($offset = null, $filter = null) |
||
| 435 | } |
||
| 436 | |||
| 437 | //-------------------------------------------------------------------- |
||
| 438 | |||
| 439 | /** |
||
| 440 | * Input::cookie |
||
| 441 | * |
||
| 442 | * Fetch input from COOKIE data. |
||
| 443 | * |
||
| 444 | * @param string|null $offset The offset of $_COOKIE variable to fetch. |
||
| 445 | * When set null will returns filtered $_COOKIE variable. |
||
| 446 | * @param int $filter The ID of the filter to apply. |
||
| 447 | * The Types of filters manual page lists the available filters. |
||
| 448 | * If omitted, FILTER_DEFAULT will be used, which is equivalent to FILTER_UNSAFE_RAW. |
||
| 449 | * This will result in no filtering taking place by default. |
||
| 450 | * |
||
| 451 | * @return mixed |
||
| 452 | */ |
||
| 453 | final public function cookie($offset = null, $filter = null) |
||
| 454 | { |
||
| 455 | return $this->filter(INPUT_COOKIE, $offset, $filter); |
||
| 456 | } |
||
| 457 | |||
| 458 | //-------------------------------------------------------------------- |
||
| 459 | |||
| 460 | /** |
||
| 461 | * Input::request |
||
| 462 | * |
||
| 463 | * Fetch input from REQUEST data. |
||
| 464 | * |
||
| 465 | * @param string|null $offset The offset of $_REQUEST variable to fetch. |
||
| 466 | * When set null will returns filtered $_REQUEST variable. |
||
| 467 | * @param int $filter The ID of the filter to apply. |
||
| 468 | * The Types of filters manual page lists the available filters. |
||
| 469 | * If omitted, FILTER_DEFAULT will be used, which is equivalent to FILTER_UNSAFE_RAW. |
||
| 470 | * This will result in no filtering taking place by default. |
||
| 471 | * |
||
| 472 | * @return mixed |
||
| 473 | */ |
||
| 474 | final public function request($offset = null, $filter = null) |
||
| 475 | { |
||
| 476 | return $this->filter(INPUT_REQUEST, $offset, $filter); |
||
| 477 | } |
||
| 478 | |||
| 479 | //-------------------------------------------------------------------- |
||
| 480 | |||
| 481 | /** |
||
| 482 | * Input::session |
||
| 483 | * |
||
| 484 | * Fetch input from SESSION data. |
||
| 485 | * |
||
| 486 | * @param string|null $offset The offset of $_SESSION variable to fetch. |
||
| 487 | * When set null will returns filtered $_SESSION variable. |
||
| 488 | * @param int $filter The ID of the filter to apply. |
||
| 489 | * The Types of filters manual page lists the available filters. |
||
| 490 | * If omitted, FILTER_DEFAULT will be used, which is equivalent to FILTER_UNSAFE_RAW. |
||
| 491 | * This will result in no filtering taking place by default. |
||
| 492 | * |
||
| 493 | * @return mixed |
||
| 494 | */ |
||
| 495 | final public function session($offset = null, $filter = null) |
||
| 496 | { |
||
| 497 | return $this->filter(INPUT_SESSION, $offset, $filter); |
||
| 498 | } |
||
| 499 | |||
| 500 | //-------------------------------------------------------------------- |
||
| 501 | |||
| 502 | /** |
||
| 503 | * Input::ipAddress |
||
| 504 | * |
||
| 505 | * Fetch input ip address. |
||
| 506 | * Determines and validates the visitor's IP address. |
||
| 507 | * |
||
| 508 | * @param string|array $proxyIps List of proxy ip addresses. |
||
| 509 | * |
||
| 510 | * @return string |
||
| 511 | */ |
||
| 512 | public function ipAddress($proxyIps = []) |
||
| 513 | { |
||
| 514 | if ( ! empty($proxyIps) && ! is_array($proxyIps)) { |
||
| 515 | $proxyIps = explode(',', str_replace(' ', '', $proxyIps)); |
||
| 516 | } |
||
| 517 | |||
| 518 | foreach ([ |
||
| 519 | 'HTTP_CLIENT_IP', |
||
| 520 | 'HTTP_FORWARDED', |
||
| 521 | 'HTTP_X_FORWARDED_FOR', |
||
| 522 | 'HTTP_X_CLIENT_IP', |
||
| 523 | 'HTTP_X_CLUSTER_CLIENT_IP', |
||
| 524 | 'REMOTE_ADDR', |
||
| 525 | ] as $header |
||
| 526 | ) { |
||
| 527 | if (null !== ($ipAddress = $this->server($header))) { |
||
| 528 | if (filter_var($ipAddress, FILTER_VALIDATE_IP)) { |
||
| 529 | if ( ! in_array($ipAddress, $proxyIps)) { |
||
| 530 | break; |
||
| 531 | } |
||
| 532 | } |
||
| 533 | } |
||
| 534 | } |
||
| 535 | |||
| 536 | return (empty($ipAddress) ? '0.0.0.0' : $ipAddress); |
||
| 537 | } |
||
| 538 | |||
| 539 | //-------------------------------------------------------------------- |
||
| 540 | |||
| 541 | /** |
||
| 542 | * Input::server |
||
| 543 | * |
||
| 544 | * Fetch input from SERVER data. |
||
| 545 | * |
||
| 546 | * @param string|null $offset The offset of $_SERVER variable to fetch. |
||
| 547 | * When set null will returns filtered $_SERVER variable. |
||
| 548 | * @param int $filter The ID of the filter to apply. |
||
| 549 | * The Types of filters manual page lists the available filters. |
||
| 550 | * If omitted, FILTER_DEFAULT will be used, which is equivalent to FILTER_UNSAFE_RAW. |
||
| 551 | * This will result in no filtering taking place by default. |
||
| 552 | * |
||
| 553 | * @return mixed |
||
| 554 | */ |
||
| 555 | final public function server($offset = null, $filter = null) |
||
| 556 | { |
||
| 557 | return $this->filter(INPUT_SERVER, $offset, $filter); |
||
| 558 | } |
||
| 559 | |||
| 560 | //-------------------------------------------------------------------- |
||
| 561 | |||
| 562 | /** |
||
| 563 | * Input::userAgent |
||
| 564 | * |
||
| 565 | * @return string |
||
| 566 | */ |
||
| 567 | public function userAgent() |
||
| 568 | { |
||
| 569 | return $this->server('HTTP_USER_AGENT'); |
||
| 570 | } |
||
| 571 | |||
| 572 | //-------------------------------------------------------------------- |
||
| 573 | |||
| 574 | /** |
||
| 575 | * Input::bearerToken |
||
| 576 | * |
||
| 577 | * @return string |
||
| 578 | */ |
||
| 579 | public function bearerToken() |
||
| 580 | { |
||
| 581 | $authorization = $this->server('HTTP_AUTHORIZATION'); |
||
| 582 | |||
| 583 | if (preg_match('/(Bearer)/', $authorization)) { |
||
| 584 | return str_replace('Bearer ', '', $authorization); |
||
| 585 | } |
||
| 586 | |||
| 587 | return false; |
||
| 588 | } |
||
| 589 | |||
| 590 | //-------------------------------------------------------------------- |
||
| 591 | |||
| 592 | /** |
||
| 593 | * Input::webToken |
||
| 594 | * |
||
| 595 | * @return string |
||
| 596 | */ |
||
| 597 | public function webToken() |
||
| 604 | } |
||
| 605 | |||
| 606 | //-------------------------------------------------------------------- |
||
| 607 | |||
| 608 | /** |
||
| 609 | * Input::basicAuth |
||
| 610 | * |
||
| 611 | * @return string |
||
| 612 | */ |
||
| 613 | public function basicAuth() |
||
| 614 | { |
||
| 615 | $authorization = $this->server('HTTP_AUTHORIZATION'); |
||
| 616 | |||
| 617 | if (preg_match('/(Basic)/', $authorization)) { |
||
| 618 | return str_replace('Basic ', '', $authorization); |
||
| 619 | } |
||
| 620 | |||
| 621 | return false; |
||
| 622 | } |
||
| 623 | |||
| 624 | //-------------------------------------------------------------------- |
||
| 625 | |||
| 626 | /** |
||
| 627 | * Input::submit |
||
| 628 | * |
||
| 629 | * Determines if the POST input is submit |
||
| 630 | * |
||
| 631 | * @return bool |
||
| 632 | */ |
||
| 633 | final public function submit() |
||
| 636 | } |
||
| 637 | } |
In general, usage of exit should be done with care and only when running in a scripting context like a CLI script.