A super easy PHP Framework for web development!
				https://github.com/exacti/phacil-framework
			
			
		
			You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							125 lines
						
					
					
						
							3.9 KiB
						
					
					
				
			
		
		
	
	
							125 lines
						
					
					
						
							3.9 KiB
						
					
					
				<?php
 | 
						|
 | 
						|
/*
 | 
						|
 * This file is part of Twig.
 | 
						|
 *
 | 
						|
 * (c) Fabien Potencier
 | 
						|
 *
 | 
						|
 * For the full copyright and license information, please view the LICENSE
 | 
						|
 * file that was distributed with this source code.
 | 
						|
 */
 | 
						|
 | 
						|
/**
 | 
						|
 * Represents a security policy which need to be enforced when sandbox mode is enabled.
 | 
						|
 *
 | 
						|
 * @final
 | 
						|
 *
 | 
						|
 * @author Fabien Potencier <fabien@symfony.com>
 | 
						|
 */
 | 
						|
class Twig_Sandbox_SecurityPolicy implements Twig_Sandbox_SecurityPolicyInterface
 | 
						|
{
 | 
						|
    protected $allowedTags;
 | 
						|
    protected $allowedFilters;
 | 
						|
    protected $allowedMethods;
 | 
						|
    protected $allowedProperties;
 | 
						|
    protected $allowedFunctions;
 | 
						|
 | 
						|
    public function __construct(array $allowedTags = [], array $allowedFilters = [], array $allowedMethods = [], array $allowedProperties = [], array $allowedFunctions = [])
 | 
						|
    {
 | 
						|
        $this->allowedTags = $allowedTags;
 | 
						|
        $this->allowedFilters = $allowedFilters;
 | 
						|
        $this->setAllowedMethods($allowedMethods);
 | 
						|
        $this->allowedProperties = $allowedProperties;
 | 
						|
        $this->allowedFunctions = $allowedFunctions;
 | 
						|
    }
 | 
						|
 | 
						|
    public function setAllowedTags(array $tags)
 | 
						|
    {
 | 
						|
        $this->allowedTags = $tags;
 | 
						|
    }
 | 
						|
 | 
						|
    public function setAllowedFilters(array $filters)
 | 
						|
    {
 | 
						|
        $this->allowedFilters = $filters;
 | 
						|
    }
 | 
						|
 | 
						|
    public function setAllowedMethods(array $methods)
 | 
						|
    {
 | 
						|
        $this->allowedMethods = [];
 | 
						|
        foreach ($methods as $class => $m) {
 | 
						|
            $this->allowedMethods[$class] = array_map('strtolower', is_array($m) ? $m : [$m]);
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    public function setAllowedProperties(array $properties)
 | 
						|
    {
 | 
						|
        $this->allowedProperties = $properties;
 | 
						|
    }
 | 
						|
 | 
						|
    public function setAllowedFunctions(array $functions)
 | 
						|
    {
 | 
						|
        $this->allowedFunctions = $functions;
 | 
						|
    }
 | 
						|
 | 
						|
    public function checkSecurity($tags, $filters, $functions)
 | 
						|
    {
 | 
						|
        foreach ($tags as $tag) {
 | 
						|
            if (!in_array($tag, $this->allowedTags)) {
 | 
						|
                throw new Twig_Sandbox_SecurityNotAllowedTagError(sprintf('Tag "%s" is not allowed.', $tag), $tag);
 | 
						|
            }
 | 
						|
        }
 | 
						|
 | 
						|
        foreach ($filters as $filter) {
 | 
						|
            if (!in_array($filter, $this->allowedFilters)) {
 | 
						|
                throw new Twig_Sandbox_SecurityNotAllowedFilterError(sprintf('Filter "%s" is not allowed.', $filter), $filter);
 | 
						|
            }
 | 
						|
        }
 | 
						|
 | 
						|
        foreach ($functions as $function) {
 | 
						|
            if (!in_array($function, $this->allowedFunctions)) {
 | 
						|
                throw new Twig_Sandbox_SecurityNotAllowedFunctionError(sprintf('Function "%s" is not allowed.', $function), $function);
 | 
						|
            }
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    public function checkMethodAllowed($obj, $method)
 | 
						|
    {
 | 
						|
        if ($obj instanceof Twig_TemplateInterface || $obj instanceof Twig_Markup) {
 | 
						|
            return true;
 | 
						|
        }
 | 
						|
 | 
						|
        $allowed = false;
 | 
						|
        $method = strtolower($method);
 | 
						|
        foreach ($this->allowedMethods as $class => $methods) {
 | 
						|
            if ($obj instanceof $class) {
 | 
						|
                $allowed = in_array($method, $methods);
 | 
						|
 | 
						|
                break;
 | 
						|
            }
 | 
						|
        }
 | 
						|
 | 
						|
        if (!$allowed) {
 | 
						|
            $class = get_class($obj);
 | 
						|
            throw new Twig_Sandbox_SecurityNotAllowedMethodError(sprintf('Calling "%s" method on a "%s" object is not allowed.', $method, $class), $class, $method);
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    public function checkPropertyAllowed($obj, $property)
 | 
						|
    {
 | 
						|
        $allowed = false;
 | 
						|
        foreach ($this->allowedProperties as $class => $properties) {
 | 
						|
            if ($obj instanceof $class) {
 | 
						|
                $allowed = in_array($property, is_array($properties) ? $properties : [$properties]);
 | 
						|
 | 
						|
                break;
 | 
						|
            }
 | 
						|
        }
 | 
						|
 | 
						|
        if (!$allowed) {
 | 
						|
            $class = get_class($obj);
 | 
						|
            throw new Twig_Sandbox_SecurityNotAllowedPropertyError(sprintf('Calling "%s" property on a "%s" object is not allowed.', $property, $class), $class, $property);
 | 
						|
        }
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
class_alias('Twig_Sandbox_SecurityPolicy', 'Twig\Sandbox\SecurityPolicy', false);
 | 
						|
 |