2007-07-19 12:40:28 +02:00
|
|
|
<?php
|
2008-02-25 03:10:37 +01:00
|
|
|
/**
|
|
|
|
* Director is responsible for processing URLs, and providing environment information.
|
|
|
|
*
|
2012-09-26 23:34:00 +02:00
|
|
|
* The most important part of director is {@link Director::direct()}, which is passed a URL and will execute the
|
|
|
|
* appropriate controller.
|
2008-02-25 03:10:37 +01:00
|
|
|
*
|
2012-09-26 23:34:00 +02:00
|
|
|
* Director also has a number of static methods that provide information about the environment, such as
|
|
|
|
* {@link Director::set_environment_type()}.
|
2008-02-25 03:10:37 +01:00
|
|
|
*
|
2012-04-12 08:02:46 +02:00
|
|
|
* @package framework
|
2008-02-25 03:10:37 +01:00
|
|
|
* @subpackage control
|
|
|
|
* @see Director::direct(),Director::addRules(),Director::set_environment_type()
|
2007-07-19 12:40:28 +02:00
|
|
|
*/
|
2012-02-11 03:08:39 +01:00
|
|
|
class Director implements TemplateGlobalProvider {
|
2007-11-10 06:17:30 +01:00
|
|
|
|
2007-07-19 12:40:28 +02:00
|
|
|
static private $urlParams;
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2007-07-19 12:40:28 +02:00
|
|
|
static private $rules = array();
|
2007-11-10 06:17:30 +01:00
|
|
|
|
2009-10-11 02:07:10 +02:00
|
|
|
/**
|
|
|
|
* @var SiteTree
|
|
|
|
*/
|
|
|
|
private static $current_page;
|
2011-04-28 13:02:10 +02:00
|
|
|
|
2007-11-10 06:17:30 +01:00
|
|
|
static $alternateBaseFolder;
|
|
|
|
|
|
|
|
static $alternateBaseURL;
|
|
|
|
|
2010-10-19 00:41:51 +02:00
|
|
|
static $dev_servers = array();
|
2007-11-10 06:17:30 +01:00
|
|
|
|
|
|
|
static $test_servers = array();
|
|
|
|
|
|
|
|
static protected $environment_type;
|
|
|
|
|
2007-07-19 12:40:28 +02:00
|
|
|
/**
|
2008-02-25 03:10:37 +01:00
|
|
|
* Add URL matching rules to the Director.
|
|
|
|
*
|
2010-10-19 05:47:11 +02:00
|
|
|
* The director is responsible for turning URLs into Controller objects.
|
2008-02-25 03:10:37 +01:00
|
|
|
*
|
2012-09-26 23:34:00 +02:00
|
|
|
* @param $priority The priority of the rules; higher values will get your rule checked first. We recommend
|
|
|
|
* priority 100 for your site's rules. The built-in rules are priority 10, standard modules are
|
|
|
|
* priority 50.
|
2007-07-19 12:40:28 +02:00
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function addRules($priority, $rules) {
|
2012-05-19 04:36:48 +02:00
|
|
|
if ($priority != 100) {
|
2012-09-26 23:34:00 +02:00
|
|
|
Deprecation::notice('3.0', 'Priority argument is now ignored - use the default of 100. You should really'
|
|
|
|
. ' be setting routes via _config yaml fragments though.', Deprecation::SCOPE_GLOBAL);
|
2012-05-19 04:36:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
Config::inst()->update('Director', 'rules', $rules);
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2008-02-25 03:10:37 +01:00
|
|
|
* Process the given URL, creating the appropriate controller and executing it.
|
|
|
|
*
|
2010-10-19 05:47:11 +02:00
|
|
|
* Request processing is handled as follows:
|
API CHANGE: Renamed conflicting classes to have an "SS_" namespace, and renamed existing "SS" namespace to "SS_". The affected classes are: HTTPRequest, HTTPResponse, Query, Database, SSBacktrace, SSCli, SSDatetime, SSDatetimeTest, SSLog, SSLogTest, SSLogEmailWriter, SSLogErrorEmailFormatter, SSLogErrorFileFormatter, SSLogFileWriter and SSZendLog.
MINOR: Replaced usage of renamed classes with the new namespaced name.
From: Andrew Short <andrewjshort@gmail.com>
git-svn-id: svn://svn.silverstripe.com/silverstripe/open/modules/sapphire/trunk@90075 467b73ca-7a2a-4603-9d3b-597d59a354a9
2009-10-26 04:06:31 +01:00
|
|
|
* - Director::direct() creates a new SS_HTTPResponse object and passes this to Director::handleRequest().
|
2012-09-26 23:34:00 +02:00
|
|
|
* - Director::handleRequest($request) checks each of the Director rules and identifies a controller to handle
|
|
|
|
* this request.
|
|
|
|
* - Controller::handleRequest($request) is then called. This will find a rule to handle the URL, and call the
|
|
|
|
* rule handling method.
|
2008-10-30 23:03:21 +01:00
|
|
|
* - RequestHandler::handleRequest($request) is recursively called whenever a rule handling method returns a
|
|
|
|
* RequestHandler object.
|
2008-08-09 05:19:54 +02:00
|
|
|
*
|
2012-09-26 23:34:00 +02:00
|
|
|
* In addition to request processing, Director will manage the session, and perform the output of the actual
|
|
|
|
* response to the browser.
|
2008-02-25 03:10:37 +01:00
|
|
|
*
|
|
|
|
* @param $url String, the URL the user is visiting, without the querystring.
|
2008-08-09 05:19:54 +02:00
|
|
|
* @uses handleRequest() rule-lookup logic is handled by this.
|
2008-02-25 03:10:37 +01:00
|
|
|
* @uses Controller::run() Controller::run() handles the page logic for a Director::direct() call.
|
2007-09-14 19:47:45 +02:00
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function direct($url, DataModel $model) {
|
2009-03-17 23:22:55 +01:00
|
|
|
// Validate $_FILES array before merging it with $_POST
|
|
|
|
foreach($_FILES as $k => $v) {
|
2009-03-18 11:16:15 +01:00
|
|
|
if(is_array($v['tmp_name'])) {
|
2010-12-14 01:15:30 +01:00
|
|
|
$v = ArrayLib::array_values_recursive($v['tmp_name']);
|
|
|
|
foreach($v as $tmpFile) {
|
2009-03-18 11:16:15 +01:00
|
|
|
if($tmpFile && !is_uploaded_file($tmpFile)) {
|
|
|
|
user_error("File upload '$k' doesn't appear to be a valid upload", E_USER_ERROR);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if($v['tmp_name'] && !is_uploaded_file($v['tmp_name'])) {
|
|
|
|
user_error("File upload '$k' doesn't appear to be a valid upload", E_USER_ERROR);
|
|
|
|
}
|
2009-03-17 23:22:55 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
API CHANGE: Renamed conflicting classes to have an "SS_" namespace, and renamed existing "SS" namespace to "SS_". The affected classes are: HTTPRequest, HTTPResponse, Query, Database, SSBacktrace, SSCli, SSDatetime, SSDatetimeTest, SSLog, SSLogTest, SSLogEmailWriter, SSLogErrorEmailFormatter, SSLogErrorFileFormatter, SSLogFileWriter and SSZendLog.
MINOR: Replaced usage of renamed classes with the new namespaced name.
From: Andrew Short <andrewjshort@gmail.com>
git-svn-id: svn://svn.silverstripe.com/silverstripe/open/modules/sapphire/trunk@90075 467b73ca-7a2a-4603-9d3b-597d59a354a9
2009-10-26 04:06:31 +01:00
|
|
|
$req = new SS_HTTPRequest(
|
2012-09-26 23:34:00 +02:00
|
|
|
(isset($_SERVER['X-HTTP-Method-Override']))
|
|
|
|
? $_SERVER['X-HTTP-Method-Override']
|
|
|
|
: $_SERVER['REQUEST_METHOD'],
|
2008-08-09 09:03:24 +02:00
|
|
|
$url,
|
|
|
|
$_GET,
|
2011-12-22 23:04:44 +01:00
|
|
|
ArrayLib::array_merge_recursive((array)$_POST, (array)$_FILES),
|
2008-08-09 09:03:24 +02:00
|
|
|
@file_get_contents('php://input')
|
|
|
|
);
|
2011-03-19 00:38:30 +01:00
|
|
|
|
2012-02-12 19:38:21 +01:00
|
|
|
$headers = self::extract_request_headers($_SERVER);
|
2011-03-19 00:38:30 +01:00
|
|
|
foreach ($headers as $header => $value) {
|
|
|
|
$req->addHeader($header, $value);
|
|
|
|
}
|
2008-08-09 05:19:54 +02:00
|
|
|
|
2012-05-03 14:44:36 +02:00
|
|
|
// Only resume a session if its not started already, and a session identifier exists
|
2012-09-26 23:34:00 +02:00
|
|
|
if(!isset($_SESSION) && (isset($_COOKIE[session_name()]) || isset($_REQUEST[session_name()]))) {
|
|
|
|
Session::start();
|
|
|
|
}
|
2012-05-03 14:44:36 +02:00
|
|
|
// Initiate an empty session - doesn't initialize an actual PHP session until saved (see belwo)
|
2009-08-08 05:10:20 +02:00
|
|
|
$session = new Session(isset($_SESSION) ? $_SESSION : null);
|
2012-05-09 14:26:29 +02:00
|
|
|
|
|
|
|
$output = Injector::inst()->get('RequestProcessor')->preRequest($req, $session, $model);
|
2009-08-08 05:10:20 +02:00
|
|
|
|
2012-05-09 14:26:29 +02:00
|
|
|
if ($output === false) {
|
|
|
|
// @TODO Need to NOT proceed with the request in an elegant manner
|
|
|
|
throw new SS_HTTPResponse_Exception(_t('Director.INVALID_REQUEST', 'Invalid request'), 400);
|
|
|
|
}
|
|
|
|
|
2011-05-01 07:33:02 +02:00
|
|
|
$result = Director::handleRequest($req, $session, $model);
|
2012-05-03 14:44:36 +02:00
|
|
|
|
|
|
|
// Save session data (and start/resume it if required)
|
2008-08-09 05:19:54 +02:00
|
|
|
$session->inst_save();
|
|
|
|
|
|
|
|
// Return code for a redirection request
|
|
|
|
if(is_string($result) && substr($result,0,9) == 'redirect:') {
|
API CHANGE: Renamed conflicting classes to have an "SS_" namespace, and renamed existing "SS" namespace to "SS_". The affected classes are: HTTPRequest, HTTPResponse, Query, Database, SSBacktrace, SSCli, SSDatetime, SSDatetimeTest, SSLog, SSLogTest, SSLogEmailWriter, SSLogErrorEmailFormatter, SSLogErrorFileFormatter, SSLogFileWriter and SSZendLog.
MINOR: Replaced usage of renamed classes with the new namespaced name.
From: Andrew Short <andrewjshort@gmail.com>
git-svn-id: svn://svn.silverstripe.com/silverstripe/open/modules/sapphire/trunk@90075 467b73ca-7a2a-4603-9d3b-597d59a354a9
2009-10-26 04:06:31 +01:00
|
|
|
$response = new SS_HTTPResponse();
|
2008-08-09 05:19:54 +02:00
|
|
|
$response->redirect(substr($result, 9));
|
2012-05-09 14:26:29 +02:00
|
|
|
$res = Injector::inst()->get('RequestProcessor')->postRequest($req, $response, $model);
|
|
|
|
if ($res !== false) {
|
|
|
|
$response->output();
|
|
|
|
}
|
2008-08-09 05:19:54 +02:00
|
|
|
// Handle a controller
|
|
|
|
} else if($result) {
|
API CHANGE: Renamed conflicting classes to have an "SS_" namespace, and renamed existing "SS" namespace to "SS_". The affected classes are: HTTPRequest, HTTPResponse, Query, Database, SSBacktrace, SSCli, SSDatetime, SSDatetimeTest, SSLog, SSLogTest, SSLogEmailWriter, SSLogErrorEmailFormatter, SSLogErrorFileFormatter, SSLogFileWriter and SSZendLog.
MINOR: Replaced usage of renamed classes with the new namespaced name.
From: Andrew Short <andrewjshort@gmail.com>
git-svn-id: svn://svn.silverstripe.com/silverstripe/open/modules/sapphire/trunk@90075 467b73ca-7a2a-4603-9d3b-597d59a354a9
2009-10-26 04:06:31 +01:00
|
|
|
if($result instanceof SS_HTTPResponse) {
|
2008-08-09 05:19:54 +02:00
|
|
|
$response = $result;
|
|
|
|
|
|
|
|
} else {
|
API CHANGE: Renamed conflicting classes to have an "SS_" namespace, and renamed existing "SS" namespace to "SS_". The affected classes are: HTTPRequest, HTTPResponse, Query, Database, SSBacktrace, SSCli, SSDatetime, SSDatetimeTest, SSLog, SSLogTest, SSLogEmailWriter, SSLogErrorEmailFormatter, SSLogErrorFileFormatter, SSLogFileWriter and SSZendLog.
MINOR: Replaced usage of renamed classes with the new namespaced name.
From: Andrew Short <andrewjshort@gmail.com>
git-svn-id: svn://svn.silverstripe.com/silverstripe/open/modules/sapphire/trunk@90075 467b73ca-7a2a-4603-9d3b-597d59a354a9
2009-10-26 04:06:31 +01:00
|
|
|
$response = new SS_HTTPResponse();
|
2008-08-09 05:19:54 +02:00
|
|
|
$response->setBody($result);
|
|
|
|
}
|
2008-10-17 02:52:58 +02:00
|
|
|
|
2012-05-09 14:26:29 +02:00
|
|
|
$res = Injector::inst()->get('RequestProcessor')->postRequest($req, $response, $model);
|
|
|
|
if ($res !== false) {
|
2012-09-29 17:23:05 +02:00
|
|
|
// Set content length (according to RFC2616)
|
|
|
|
if(
|
|
|
|
!headers_sent()
|
|
|
|
&& $response->getBody()
|
|
|
|
&& $req->httpMethod() != 'HEAD'
|
|
|
|
&& $response->getStatusCode() >= 200
|
|
|
|
&& !in_array($response->getStatusCode(), array(204, 304))
|
|
|
|
) {
|
|
|
|
$response->fixContentLength();
|
|
|
|
}
|
2012-10-03 16:16:19 +02:00
|
|
|
|
2012-05-09 14:26:29 +02:00
|
|
|
$response->output();
|
2008-10-17 02:52:58 +02:00
|
|
|
} else {
|
2012-05-09 14:26:29 +02:00
|
|
|
// @TODO Proper response here.
|
|
|
|
throw new SS_HTTPResponse_Exception("Invalid response");
|
2008-10-17 02:52:58 +02:00
|
|
|
}
|
2012-05-09 14:26:29 +02:00
|
|
|
|
2008-08-09 05:19:54 +02:00
|
|
|
|
|
|
|
//$controllerObj->getSession()->inst_save();
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
|
|
|
}
|
2007-08-21 00:39:44 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Test a URL request, returning a response object.
|
2008-02-25 03:10:37 +01:00
|
|
|
*
|
2012-09-26 23:34:00 +02:00
|
|
|
* This method is the counterpart of Director::direct() that is used in functional testing. It will execute the
|
|
|
|
* URL given, and return the result as an SS_HTTPResponse object.
|
2008-02-25 03:10:37 +01:00
|
|
|
*
|
2008-08-09 09:03:24 +02:00
|
|
|
* @param string $url The URL to visit
|
|
|
|
* @param array $postVars The $_POST & $_FILES variables
|
2012-09-26 23:34:00 +02:00
|
|
|
* @param Session $session The {@link Session} object representing the current session. By passing the same
|
|
|
|
* object to multiple calls of Director::test(), you can simulate a persisted session.
|
|
|
|
* @param string $httpMethod The HTTP method, such as GET or POST. It will default to POST if postVars is set,
|
|
|
|
* GET otherwise. Overwritten by $postVars['_method'] if present.
|
2008-08-09 09:03:24 +02:00
|
|
|
* @param string $body The HTTP body
|
|
|
|
* @param array $headers HTTP headers with key-value pairs
|
2009-12-16 06:42:43 +01:00
|
|
|
* @param array $cookies to populate $_COOKIE
|
2012-08-27 00:56:59 +02:00
|
|
|
* @param HTTP_Request $request The {@see HTTP_Request} object generated as a part of this request
|
API CHANGE: Renamed conflicting classes to have an "SS_" namespace, and renamed existing "SS" namespace to "SS_". The affected classes are: HTTPRequest, HTTPResponse, Query, Database, SSBacktrace, SSCli, SSDatetime, SSDatetimeTest, SSLog, SSLogTest, SSLogEmailWriter, SSLogErrorEmailFormatter, SSLogErrorFileFormatter, SSLogFileWriter and SSZendLog.
MINOR: Replaced usage of renamed classes with the new namespaced name.
From: Andrew Short <andrewjshort@gmail.com>
git-svn-id: svn://svn.silverstripe.com/silverstripe/open/modules/sapphire/trunk@90075 467b73ca-7a2a-4603-9d3b-597d59a354a9
2009-10-26 04:06:31 +01:00
|
|
|
* @return SS_HTTPResponse
|
2008-02-25 03:10:37 +01:00
|
|
|
*
|
|
|
|
* @uses getControllerForURL() The rule-lookup logic is handled by this.
|
|
|
|
* @uses Controller::run() Controller::run() handles the page logic for a Director::direct() call.
|
2007-08-21 00:39:44 +02:00
|
|
|
*/
|
2012-09-26 23:34:00 +02:00
|
|
|
public static function test($url, $postVars = null, $session = null, $httpMethod = null, $body = null,
|
|
|
|
$headers = null, $cookies = null, &$request = null) {
|
|
|
|
|
2008-10-08 05:37:33 +02:00
|
|
|
// These are needed so that calling Director::test() doesnt muck with whoever is calling it.
|
2010-10-19 05:47:11 +02:00
|
|
|
// Really, it's some inappropriate coupling and should be resolved by making less use of statics
|
2008-10-08 05:37:33 +02:00
|
|
|
$oldStage = Versioned::current_stage();
|
2008-12-04 23:38:32 +01:00
|
|
|
$getVars = array();
|
2008-10-08 05:37:33 +02:00
|
|
|
|
2008-10-14 21:55:55 +02:00
|
|
|
if(!$httpMethod) $httpMethod = ($postVars || is_array($postVars)) ? "POST" : "GET";
|
2008-08-09 05:19:54 +02:00
|
|
|
|
|
|
|
if(!$session) $session = new Session(null);
|
2008-08-11 07:26:51 +02:00
|
|
|
|
|
|
|
// Back up the current values of the superglobals
|
2010-10-15 05:08:23 +02:00
|
|
|
$existingRequestVars = isset($_REQUEST) ? $_REQUEST : array();
|
|
|
|
$existingGetVars = isset($_GET) ? $_GET : array();
|
|
|
|
$existingPostVars = isset($_POST) ? $_POST : array();
|
2010-10-15 02:34:18 +02:00
|
|
|
$existingSessionVars = isset($_SESSION) ? $_SESSION : array();
|
2010-10-15 05:08:23 +02:00
|
|
|
$existingCookies = isset($_COOKIE) ? $_COOKIE : array();
|
|
|
|
$existingServer = isset($_SERVER) ? $_SERVER : array();
|
|
|
|
|
2008-11-22 04:33:00 +01:00
|
|
|
$existingCookieReportErrors = Cookie::report_errors();
|
|
|
|
$existingRequirementsBackend = Requirements::backend();
|
2009-01-08 00:00:54 +01:00
|
|
|
|
|
|
|
Cookie::set_report_errors(false);
|
2008-11-22 04:33:00 +01:00
|
|
|
Requirements::set_backend(new Requirements_Backend());
|
2008-08-11 07:26:51 +02:00
|
|
|
|
2009-07-13 06:15:40 +02:00
|
|
|
// Handle absolute URLs
|
|
|
|
if (@parse_url($url, PHP_URL_HOST) != '') {
|
|
|
|
$bits = parse_url($url);
|
|
|
|
$_SERVER['HTTP_HOST'] = $bits['host'];
|
2009-10-16 00:24:29 +02:00
|
|
|
$url = Director::makeRelative($url);
|
2009-07-13 06:15:40 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
$urlWithQuerystring = $url;
|
|
|
|
if(strpos($url, '?') !== false) {
|
|
|
|
list($url, $getVarsEncoded) = explode('?', $url, 2);
|
|
|
|
parse_str($getVarsEncoded, $getVars);
|
|
|
|
}
|
|
|
|
|
2008-08-11 07:26:51 +02:00
|
|
|
// Replace the superglobals with appropriate test values
|
2011-12-22 23:04:44 +01:00
|
|
|
$_REQUEST = ArrayLib::array_merge_recursive((array)$getVars, (array)$postVars);
|
2008-08-11 07:26:51 +02:00
|
|
|
$_GET = (array)$getVars;
|
2008-08-11 07:55:31 +02:00
|
|
|
$_POST = (array)$postVars;
|
2008-08-11 07:26:51 +02:00
|
|
|
$_SESSION = $session ? $session->inst_getAll() : array();
|
2009-12-16 06:42:43 +01:00
|
|
|
$_COOKIE = (array) $cookies;
|
2009-01-08 00:00:54 +01:00
|
|
|
$_SERVER['REQUEST_URI'] = Director::baseURL() . $urlWithQuerystring;
|
2008-08-11 07:26:51 +02:00
|
|
|
|
2012-08-27 00:56:59 +02:00
|
|
|
$request = new SS_HTTPRequest($httpMethod, $url, $getVars, $postVars, $body);
|
|
|
|
if($headers) foreach($headers as $k => $v) $request->addHeader($k, $v);
|
2011-05-01 07:33:02 +02:00
|
|
|
// TODO: Pass in the DataModel
|
2012-08-27 00:56:59 +02:00
|
|
|
$result = Director::handleRequest($request, $session, DataModel::inst());
|
2008-08-11 07:55:31 +02:00
|
|
|
|
2008-08-11 07:26:51 +02:00
|
|
|
// Restore the superglobals
|
|
|
|
$_REQUEST = $existingRequestVars;
|
|
|
|
$_GET = $existingGetVars;
|
|
|
|
$_POST = $existingPostVars;
|
2008-10-14 21:59:01 +02:00
|
|
|
$_SESSION = $existingSessionVars;
|
2008-11-22 04:33:00 +01:00
|
|
|
$_COOKIE = $existingCookies;
|
2009-01-08 00:00:54 +01:00
|
|
|
$_SERVER = $existingServer;
|
|
|
|
|
2008-11-22 04:33:00 +01:00
|
|
|
Cookie::set_report_errors($existingCookieReportErrors);
|
|
|
|
Requirements::set_backend($existingRequirementsBackend);
|
2008-10-08 05:37:33 +02:00
|
|
|
|
|
|
|
// These are needed so that calling Director::test() doesnt muck with whoever is calling it.
|
2010-10-19 05:47:11 +02:00
|
|
|
// Really, it's some inappropriate coupling and should be resolved by making less use of statics
|
2008-10-08 05:37:33 +02:00
|
|
|
Versioned::reading_stage($oldStage);
|
2007-08-21 00:39:44 +02:00
|
|
|
|
2008-08-09 05:19:54 +02:00
|
|
|
return $result;
|
2007-08-21 00:39:44 +02:00
|
|
|
}
|
|
|
|
|
2008-03-03 00:24:10 +01:00
|
|
|
/**
|
API CHANGE: Renamed conflicting classes to have an "SS_" namespace, and renamed existing "SS" namespace to "SS_". The affected classes are: HTTPRequest, HTTPResponse, Query, Database, SSBacktrace, SSCli, SSDatetime, SSDatetimeTest, SSLog, SSLogTest, SSLogEmailWriter, SSLogErrorEmailFormatter, SSLogErrorFileFormatter, SSLogFileWriter and SSZendLog.
MINOR: Replaced usage of renamed classes with the new namespaced name.
From: Andrew Short <andrewjshort@gmail.com>
git-svn-id: svn://svn.silverstripe.com/silverstripe/open/modules/sapphire/trunk@90075 467b73ca-7a2a-4603-9d3b-597d59a354a9
2009-10-26 04:06:31 +01:00
|
|
|
* Handle an HTTP request, defined with a SS_HTTPRequest object.
|
2008-08-11 05:03:52 +02:00
|
|
|
*
|
API CHANGE: Renamed conflicting classes to have an "SS_" namespace, and renamed existing "SS" namespace to "SS_". The affected classes are: HTTPRequest, HTTPResponse, Query, Database, SSBacktrace, SSCli, SSDatetime, SSDatetimeTest, SSLog, SSLogTest, SSLogEmailWriter, SSLogErrorEmailFormatter, SSLogErrorFileFormatter, SSLogFileWriter and SSZendLog.
MINOR: Replaced usage of renamed classes with the new namespaced name.
From: Andrew Short <andrewjshort@gmail.com>
git-svn-id: svn://svn.silverstripe.com/silverstripe/open/modules/sapphire/trunk@90075 467b73ca-7a2a-4603-9d3b-597d59a354a9
2009-10-26 04:06:31 +01:00
|
|
|
* @return SS_HTTPResponse|string
|
2008-03-03 00:24:10 +01:00
|
|
|
*/
|
2011-05-01 07:33:02 +02:00
|
|
|
protected static function handleRequest(SS_HTTPRequest $request, Session $session, DataModel $model) {
|
2012-05-19 04:36:48 +02:00
|
|
|
$rules = Config::inst()->get('Director', 'rules');
|
|
|
|
|
|
|
|
if(isset($_REQUEST['debug'])) Debug::show($rules);
|
|
|
|
|
|
|
|
foreach($rules as $pattern => $controllerOptions) {
|
|
|
|
if(is_string($controllerOptions)) {
|
2012-09-26 23:34:00 +02:00
|
|
|
if(substr($controllerOptions,0,2) == '->') {
|
|
|
|
$controllerOptions = array('Redirect' => substr($controllerOptions,2));
|
|
|
|
} else {
|
|
|
|
$controllerOptions = array('Controller' => $controllerOptions);
|
|
|
|
}
|
2012-05-19 04:36:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if(($arguments = $request->match($pattern, true)) !== false) {
|
2012-08-27 00:56:59 +02:00
|
|
|
$request->setRouteParams($controllerOptions);
|
2012-05-19 04:36:48 +02:00
|
|
|
// controllerOptions provide some default arguments
|
|
|
|
$arguments = array_merge($controllerOptions, $arguments);
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2012-05-19 04:36:48 +02:00
|
|
|
// Find the controller name
|
|
|
|
if(isset($arguments['Controller'])) $controller = $arguments['Controller'];
|
|
|
|
|
|
|
|
// Pop additional tokens from the tokeniser if necessary
|
|
|
|
if(isset($controllerOptions['_PopTokeniser'])) {
|
|
|
|
$request->shift($controllerOptions['_PopTokeniser']);
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
2008-10-14 21:59:01 +02:00
|
|
|
|
2012-05-19 04:36:48 +02:00
|
|
|
// Handle redirections
|
|
|
|
if(isset($arguments['Redirect'])) {
|
|
|
|
return "redirect:" . Director::absoluteURL($arguments['Redirect'], true);
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2012-05-19 04:36:48 +02:00
|
|
|
} else {
|
|
|
|
Director::$urlParams = $arguments;
|
|
|
|
$controllerObj = Injector::inst()->create($controller);
|
|
|
|
$controllerObj->setSession($session);
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2012-05-19 04:36:48 +02:00
|
|
|
try {
|
|
|
|
$result = $controllerObj->handleRequest($request, $model);
|
|
|
|
} catch(SS_HTTPResponse_Exception $responseException) {
|
|
|
|
$result = $responseException->getResponse();
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
2012-05-19 04:36:48 +02:00
|
|
|
if(!is_object($result) || $result instanceof SS_HTTPResponse) return $result;
|
|
|
|
|
|
|
|
user_error("Bad result from url " . $request->getURL() . " handled by " .
|
|
|
|
get_class($controllerObj)." controller: ".get_class($result), E_USER_WARNING);
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2009-10-11 02:07:10 +02:00
|
|
|
|
2010-10-15 04:53:11 +02:00
|
|
|
/**
|
|
|
|
* Set url parameters (should only be called internally by RequestHandler->handleRequest()).
|
|
|
|
*
|
|
|
|
* @param $params array
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function setUrlParams($params) {
|
2010-10-15 04:53:11 +02:00
|
|
|
Director::$urlParams = $params;
|
|
|
|
}
|
2009-10-11 02:07:10 +02:00
|
|
|
|
2008-03-03 00:24:10 +01:00
|
|
|
/**
|
2010-10-19 05:47:11 +02:00
|
|
|
* Return the {@link SiteTree} object that is currently being viewed. If there is no SiteTree object to return,
|
2009-10-11 02:07:10 +02:00
|
|
|
* then this will return the current controller.
|
|
|
|
*
|
|
|
|
* @return SiteTree
|
|
|
|
*/
|
|
|
|
public static function get_current_page() {
|
|
|
|
return self::$current_page ? self::$current_page : Controller::curr();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set the currently active {@link SiteTree} object that is being used to respond to the request.
|
|
|
|
*
|
|
|
|
* @param SiteTree $page
|
|
|
|
*/
|
|
|
|
public static function set_current_page($page) {
|
|
|
|
self::$current_page = $page;
|
|
|
|
}
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2008-03-03 00:24:10 +01:00
|
|
|
/**
|
|
|
|
* Turns the given URL into an absolute URL.
|
|
|
|
* @todo Document how relativeToSiteBase works
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function absoluteURL($url, $relativeToSiteBase = false) {
|
2010-12-06 00:34:19 +01:00
|
|
|
if(!isset($_SERVER['REQUEST_URI'])) return false;
|
|
|
|
|
2012-09-26 23:34:00 +02:00
|
|
|
if(strpos($url,'/') === false && !$relativeToSiteBase) {
|
|
|
|
$url = dirname($_SERVER['REQUEST_URI'] . 'x') . '/' . $url;
|
|
|
|
}
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2012-12-08 12:20:20 +01:00
|
|
|
if(substr($url,0,4) != "http") {
|
|
|
|
if($url[0] != "/") $url = Director::baseURL() . $url;
|
2008-09-30 01:41:50 +02:00
|
|
|
// Sometimes baseURL() can return a full URL instead of just a path
|
|
|
|
if(substr($url,0,4) != "http") $url = self::protocolAndHost() . $url;
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return $url;
|
|
|
|
}
|
|
|
|
|
2008-03-03 00:24:10 +01:00
|
|
|
/**
|
|
|
|
* Returns the part of the URL, 'http://www.mysite.com'.
|
2008-09-29 14:52:23 +02:00
|
|
|
*
|
2012-09-26 23:34:00 +02:00
|
|
|
* @return boolean|string The domain from the PHP environment. Returns FALSE is this environment variable isn't
|
|
|
|
* set.
|
2008-03-03 00:24:10 +01:00
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function protocolAndHost() {
|
2007-09-25 05:44:07 +02:00
|
|
|
if(self::$alternateBaseURL) {
|
2008-09-30 01:41:50 +02:00
|
|
|
if(preg_match('/^(http[^:]*:\/\/[^\/]+)(\/|$)/', self::$alternateBaseURL, $matches)) {
|
2007-09-25 05:44:07 +02:00
|
|
|
return $matches[1];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-09-29 14:52:23 +02:00
|
|
|
if(isset($_SERVER['HTTP_HOST'])) {
|
2010-10-15 05:09:32 +02:00
|
|
|
return Director::protocol() . $_SERVER['HTTP_HOST'];
|
2008-09-29 14:52:23 +02:00
|
|
|
} else {
|
2008-10-02 11:48:56 +02:00
|
|
|
global $_FILE_TO_URL_MAPPING;
|
|
|
|
if(Director::is_cli() && isset($_FILE_TO_URL_MAPPING)) $errorSuggestion = ' You probably want to define '.
|
|
|
|
'an entry in $_FILE_TO_URL_MAPPING that covers "' . Director::baseFolder() . '"';
|
|
|
|
else if(Director::is_cli()) $errorSuggestion = ' You probably want to define $_FILE_TO_URL_MAPPING in '.
|
|
|
|
'your _ss_environment.php as instructed on the "sake" page of the doc.silverstripe.com wiki';
|
|
|
|
else $errorSuggestion = "";
|
|
|
|
|
2012-09-26 23:34:00 +02:00
|
|
|
user_error("Director::protocolAndHost() lacks sufficient information - HTTP_HOST not set."
|
|
|
|
. $errorSuggestion, E_USER_WARNING);
|
2008-09-29 14:52:23 +02:00
|
|
|
return false;
|
|
|
|
|
2008-08-12 04:51:33 +02:00
|
|
|
}
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2010-10-15 05:09:32 +02:00
|
|
|
/**
|
|
|
|
* Return the current protocol that the site is running under
|
|
|
|
*
|
|
|
|
* @return String
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function protocol() {
|
2012-09-26 23:34:00 +02:00
|
|
|
if(isset($_SERVER['HTTP_X_FORWARDED_PROTOCOL'])&&strtolower($_SERVER['HTTP_X_FORWARDED_PROTOCOL'])=='https') {
|
|
|
|
return "https://";
|
|
|
|
}
|
|
|
|
return (isset($_SERVER['SSL']) || (!empty($_SERVER['HTTPS']) && $_SERVER['HTTPS'] != 'off'))
|
|
|
|
? 'https://' : 'http://';
|
2010-10-15 05:09:32 +02:00
|
|
|
}
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2007-07-19 12:40:28 +02:00
|
|
|
/**
|
2008-03-03 00:24:10 +01:00
|
|
|
* Returns the root URL for the site.
|
2008-09-27 19:02:46 +02:00
|
|
|
* It will be automatically calculated unless it is overridden with {@link setBaseURL()}.
|
2007-07-19 12:40:28 +02:00
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function baseURL() {
|
2008-09-27 19:02:46 +02:00
|
|
|
if(self::$alternateBaseURL) return self::$alternateBaseURL;
|
|
|
|
else {
|
2010-04-13 01:15:04 +02:00
|
|
|
$base = BASE_URL;
|
2009-03-10 23:08:52 +01:00
|
|
|
if($base == '/' || $base == '/.' || $base == '\\') $baseURL = '/';
|
|
|
|
else $baseURL = $base . '/';
|
|
|
|
|
|
|
|
if(defined('BASE_SCRIPT_URL')) return $baseURL . BASE_SCRIPT_URL;
|
|
|
|
else return $baseURL;
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
|
|
|
}
|
2007-11-10 06:17:30 +01:00
|
|
|
|
2008-03-03 00:24:10 +01:00
|
|
|
/**
|
|
|
|
* Sets the root URL for the website.
|
|
|
|
* If the site isn't accessible from the URL you provide, weird things will happen.
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function setBaseURL($baseURL) {
|
2007-07-19 12:40:28 +02:00
|
|
|
self::$alternateBaseURL = $baseURL;
|
|
|
|
}
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2008-03-03 00:24:10 +01:00
|
|
|
/**
|
|
|
|
* Returns the root filesystem folder for the site.
|
|
|
|
* It will be automatically calculated unless it is overridden with {@link setBaseFolder()}.
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function baseFolder() {
|
2007-07-19 12:40:28 +02:00
|
|
|
if(self::$alternateBaseFolder) return self::$alternateBaseFolder;
|
2010-04-13 01:15:04 +02:00
|
|
|
else return BASE_PATH;
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
2008-03-03 00:24:10 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets the root folder for the website.
|
|
|
|
* If the site isn't accessible from the folder you provide, weird things will happen.
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function setBaseFolder($baseFolder) {
|
2007-07-19 12:40:28 +02:00
|
|
|
self::$alternateBaseFolder = $baseFolder;
|
|
|
|
}
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2008-03-03 00:24:10 +01:00
|
|
|
/**
|
2012-07-01 12:07:07 +02:00
|
|
|
* Turns an absolute URL or folder into one that's relative to the root of
|
|
|
|
* the site. This is useful when turning a URL into a filesystem reference,
|
|
|
|
* or vice versa.
|
2009-03-17 23:22:55 +01:00
|
|
|
*
|
|
|
|
* @param string $url Accepts both a URL or a filesystem path
|
2012-07-01 12:07:07 +02:00
|
|
|
* @return string Either a relative URL if the checks succeeded, or the
|
|
|
|
* original (possibly absolute) URL.
|
2008-03-03 00:24:10 +01:00
|
|
|
*/
|
2012-07-01 12:07:07 +02:00
|
|
|
public static function makeRelative($url) {
|
|
|
|
// Allow for the accidental inclusion whitespace and // in the URL
|
|
|
|
$url = trim(preg_replace('#([^:])//#', '\\1/', $url));
|
|
|
|
|
2008-10-02 11:48:56 +02:00
|
|
|
$base1 = self::absoluteBaseURL();
|
2012-07-01 12:07:07 +02:00
|
|
|
$baseDomain = substr($base1, strlen(self::protocol()));
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2008-10-02 11:48:56 +02:00
|
|
|
// Only bother comparing the URL to the absolute version if $url looks like a URL.
|
2012-07-01 12:07:07 +02:00
|
|
|
if(preg_match('/^https?[^:]*:\/\//',$url,$matches)) {
|
|
|
|
$urlProtocol = $matches[0];
|
|
|
|
$urlWithoutProtocol = substr($url, strlen($urlProtocol));
|
|
|
|
|
2010-10-19 03:25:50 +02:00
|
|
|
// If we are already looking at baseURL, return '' (substr will return false)
|
2012-07-01 12:07:07 +02:00
|
|
|
if($url == $base1) {
|
|
|
|
return '';
|
|
|
|
}
|
|
|
|
else if(substr($url,0,strlen($base1)) == $base1) {
|
|
|
|
return substr($url,strlen($base1));
|
|
|
|
}
|
|
|
|
else if(substr($base1,-1)=="/" && $url == substr($base1,0,-1)) {
|
2009-10-16 00:24:29 +02:00
|
|
|
// Convert http://www.mydomain.com/mysitedir to ''
|
2012-07-01 12:07:07 +02:00
|
|
|
return "";
|
2012-12-12 10:11:56 +01:00
|
|
|
}
|
|
|
|
|
2012-07-01 12:07:07 +02:00
|
|
|
if(substr($urlWithoutProtocol,0,strlen($baseDomain)) == $baseDomain) {
|
|
|
|
return substr($urlWithoutProtocol,strlen($baseDomain));
|
|
|
|
}
|
2008-10-02 11:48:56 +02:00
|
|
|
}
|
|
|
|
|
2009-03-17 23:22:55 +01:00
|
|
|
// test for base folder, e.g. /var/www
|
2008-10-02 11:48:56 +02:00
|
|
|
$base2 = self::baseFolder();
|
|
|
|
if(substr($url,0,strlen($base2)) == $base2) return substr($url,strlen($base2));
|
|
|
|
|
2009-03-17 23:22:55 +01:00
|
|
|
// Test for relative base url, e.g. mywebsite/ if the full URL is http://localhost/mywebsite/
|
2008-10-02 11:48:56 +02:00
|
|
|
$base3 = self::baseURL();
|
2012-07-01 12:07:07 +02:00
|
|
|
if(substr($url,0,strlen($base3)) == $base3) {
|
|
|
|
return substr($url,strlen($base3));
|
|
|
|
}
|
2008-05-26 08:21:30 +02:00
|
|
|
|
2012-07-01 12:07:07 +02:00
|
|
|
// Test for relative base url, e.g mywebsite/ if the full url is localhost/myswebsite
|
|
|
|
if(substr($url,0,strlen($baseDomain)) == $baseDomain) {
|
|
|
|
return substr($url, strlen($baseDomain));
|
|
|
|
}
|
|
|
|
|
2009-03-17 23:22:55 +01:00
|
|
|
// Nothing matched, fall back to returning the original URL
|
2007-07-19 12:40:28 +02:00
|
|
|
return $url;
|
|
|
|
}
|
2008-10-12 18:16:25 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns true if a given path is absolute. Works under both *nix and windows
|
|
|
|
* systems
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public static function is_absolute($path) {
|
|
|
|
if($path[0] == '/' || $path[0] == '\\') return true;
|
|
|
|
return preg_match('/^[a-zA-Z]:[\\\\\/]/', $path) == 1;
|
|
|
|
}
|
|
|
|
|
2009-02-11 22:07:58 +01:00
|
|
|
/**
|
|
|
|
* Checks if a given URL is absolute (e.g. starts with 'http://' etc.).
|
2012-05-04 11:55:40 +02:00
|
|
|
* URLs beginning with "//" are treated as absolute, as browsers take this to mean
|
|
|
|
* the same protocol as currently being used.
|
|
|
|
*
|
|
|
|
* Useful to check before redirecting based on a URL from user submissions
|
|
|
|
* through $_GET or $_POST, and avoid phishing attacks by redirecting
|
|
|
|
* to an attackers server.
|
|
|
|
*
|
|
|
|
* Note: Can't solely rely on PHP's parse_url() , since it is not intended to work with relative URLs
|
|
|
|
* or for security purposes. filter_var($url, FILTER_VALIDATE_URL) has similar problems.
|
2009-02-11 22:07:58 +01:00
|
|
|
*
|
|
|
|
* @param string $url
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public static function is_absolute_url($url) {
|
2012-06-29 07:14:28 +02:00
|
|
|
// Strip off the query and fragment parts of the URL before checking
|
|
|
|
if(($queryPosition = strpos($url, '?')) !== false) {
|
|
|
|
$url = substr($url, 0, $queryPosition-1);
|
|
|
|
}
|
|
|
|
if(($hashPosition = strpos($url, '#')) !== false) {
|
|
|
|
$url = substr($url, 0, $hashPosition-1);
|
|
|
|
}
|
2012-05-04 11:55:40 +02:00
|
|
|
$colonPosition = strpos($url, ':');
|
2012-06-29 07:14:28 +02:00
|
|
|
$slashPosition = strpos($url, '/');
|
|
|
|
return (
|
|
|
|
// Base check for existence of a host on a compliant URL
|
|
|
|
parse_url($url, PHP_URL_HOST)
|
|
|
|
// Check for more than one leading slash without a protocol.
|
2012-12-08 12:20:20 +01:00
|
|
|
// While not a RFC compliant absolute URL, it is completed to a valid URL by some browsers,
|
|
|
|
// and hence a potential security risk. Single leading slashes are not an issue though.
|
2012-06-29 07:14:28 +02:00
|
|
|
|| preg_match('/\s*[\/]{2,}/', $url)
|
|
|
|
|| (
|
|
|
|
// If a colon is found, check if it's part of a valid scheme definition
|
|
|
|
// (meaning its not preceded by a slash).
|
|
|
|
$colonPosition !== FALSE
|
|
|
|
&& ($slashPosition === FALSE || $colonPosition < $slashPosition)
|
|
|
|
)
|
|
|
|
);
|
2009-02-11 22:07:58 +01:00
|
|
|
}
|
|
|
|
|
2009-03-17 23:22:55 +01:00
|
|
|
/**
|
2012-05-04 11:55:40 +02:00
|
|
|
* Checks if a given URL is relative by checking {@link is_absolute_url()}.
|
2009-03-17 23:22:55 +01:00
|
|
|
*
|
|
|
|
* @param string $url
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public static function is_relative_url($url) {
|
|
|
|
return (!Director::is_absolute_url($url));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2012-05-04 11:55:40 +02:00
|
|
|
* Checks if the given URL is belonging to this "site" (not an external link).
|
|
|
|
* That's the case if the URL is relative, as defined by {@link is_relative_url()},
|
|
|
|
* or if the host matches {@link protocolAndHost()}.
|
|
|
|
*
|
2009-03-17 23:22:55 +01:00
|
|
|
* Useful to check before redirecting based on a URL from user submissions
|
|
|
|
* through $_GET or $_POST, and avoid phishing attacks by redirecting
|
|
|
|
* to an attackers server.
|
|
|
|
*
|
|
|
|
* @param string $url
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public static function is_site_url($url) {
|
2012-05-04 11:55:40 +02:00
|
|
|
$urlHost = parse_url($url, PHP_URL_HOST);
|
|
|
|
$actualHost = parse_url(self::protocolAndHost(), PHP_URL_HOST);
|
|
|
|
if($urlHost && $actualHost && $urlHost == $actualHost) {
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return self::is_relative_url($url);
|
|
|
|
}
|
2009-03-17 23:22:55 +01:00
|
|
|
}
|
2011-03-19 00:38:30 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Takes a $_SERVER data array and extracts HTTP request headers.
|
|
|
|
*
|
|
|
|
* @param array $data
|
|
|
|
* @return array
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function extract_request_headers(array $server) {
|
2011-03-19 00:38:30 +01:00
|
|
|
$headers = array();
|
|
|
|
|
|
|
|
foreach($server as $key => $value) {
|
|
|
|
if(substr($key, 0, 5) == 'HTTP_') {
|
|
|
|
$key = substr($key, 5);
|
|
|
|
$key = strtolower(str_replace('_', ' ', $key));
|
|
|
|
$key = str_replace(' ', '-', ucwords($key));
|
|
|
|
$headers[$key] = $value;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(isset($server['CONTENT_TYPE'])) $headers['Content-Type'] = $server['CONTENT_TYPE'];
|
|
|
|
if(isset($server['CONTENT_LENGTH'])) $headers['Content-Length'] = $server['CONTENT_LENGTH'];
|
2009-03-17 23:22:55 +01:00
|
|
|
|
2011-03-19 00:38:30 +01:00
|
|
|
return $headers;
|
|
|
|
}
|
|
|
|
|
2008-03-03 00:24:10 +01:00
|
|
|
/**
|
2008-08-20 08:31:12 +02:00
|
|
|
* Given a filesystem reference relative to the site root, return the full file-system path.
|
2008-04-09 12:59:30 +02:00
|
|
|
*
|
|
|
|
* @param string $file
|
|
|
|
* @return string
|
|
|
|
*/
|
2008-10-12 18:16:25 +02:00
|
|
|
public static function getAbsFile($file) {
|
|
|
|
return self::is_absolute($file) ? $file : Director::baseFolder() . '/' . $file;
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
2007-11-10 06:17:30 +01:00
|
|
|
|
2008-03-03 00:24:10 +01:00
|
|
|
/**
|
|
|
|
* Returns true if the given file exists.
|
|
|
|
* @param $file Filename specified relative to the site root
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function fileExists($file) {
|
2008-04-06 06:00:43 +02:00
|
|
|
// replace any appended query-strings, e.g. /path/to/foo.php?bar=1 to /path/to/foo.php
|
|
|
|
$file = preg_replace('/([^\?]*)?.*/','$1',$file);
|
2007-07-19 12:40:28 +02:00
|
|
|
return file_exists(Director::getAbsFile($file));
|
|
|
|
}
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2007-07-19 12:40:28 +02:00
|
|
|
/**
|
2008-03-03 00:24:10 +01:00
|
|
|
* Returns the Absolute URL of the site root.
|
2007-07-19 12:40:28 +02:00
|
|
|
*/
|
2012-12-08 12:20:20 +01:00
|
|
|
public static function absoluteBaseURL() {
|
|
|
|
return Director::absoluteURL(Director::baseURL());
|
|
|
|
}
|
|
|
|
|
2008-03-03 00:24:10 +01:00
|
|
|
/**
|
|
|
|
* Returns the Absolute URL of the site root, embedding the current basic-auth credentials into the URL.
|
|
|
|
*/
|
2012-12-08 12:20:20 +01:00
|
|
|
public static function absoluteBaseURLWithAuth() {
|
2008-08-11 05:03:52 +02:00
|
|
|
$s = "";
|
|
|
|
$login = "";
|
|
|
|
|
2012-12-08 12:20:20 +01:00
|
|
|
if(isset($_SERVER['PHP_AUTH_USER'])) $login = "$_SERVER[PHP_AUTH_USER]:$_SERVER[PHP_AUTH_PW]@";
|
2010-10-15 05:09:32 +02:00
|
|
|
|
2012-12-08 12:20:20 +01:00
|
|
|
return Director::protocol() . $login . $_SERVER['HTTP_HOST'] . Director::baseURL();
|
|
|
|
}
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2007-07-19 12:40:28 +02:00
|
|
|
/**
|
2010-10-19 02:32:42 +02:00
|
|
|
* Force the site to run on SSL.
|
2008-03-03 00:24:10 +01:00
|
|
|
*
|
2010-10-19 02:32:42 +02:00
|
|
|
* To use, call from _config.php. For example:
|
2008-03-03 00:24:10 +01:00
|
|
|
* <code>
|
|
|
|
* if(Director::isLive()) Director::forceSSL();
|
|
|
|
* </code>
|
2010-10-19 02:32:42 +02:00
|
|
|
*
|
|
|
|
* If you don't want your entire site to be on SSL, you can pass an array of PCRE regular expression
|
|
|
|
* patterns for matching relative URLs. For example:
|
|
|
|
* <code>
|
2010-10-19 02:58:52 +02:00
|
|
|
* if(Director::isLive()) Director::forceSSL(array('/^admin/', '/^Security/'));
|
2010-10-19 02:32:42 +02:00
|
|
|
* </code>
|
|
|
|
*
|
|
|
|
* Note that the session data will be lost when moving from HTTP to HTTPS.
|
|
|
|
* It is your responsibility to ensure that this won't cause usability problems.
|
|
|
|
*
|
|
|
|
* CAUTION: This does not respect the site environment mode. You should check this
|
|
|
|
* as per the above examples using Director::isLive() or Director::isTest() for example.
|
|
|
|
*
|
|
|
|
* @return boolean|string String of URL when unit tests running, boolean FALSE if patterns don't match request URI
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function forceSSL($patterns = null) {
|
2010-12-06 00:34:19 +01:00
|
|
|
if(!isset($_SERVER['REQUEST_URI'])) return false;
|
|
|
|
|
2010-10-19 02:32:42 +02:00
|
|
|
$matched = false;
|
|
|
|
|
|
|
|
if($patterns) {
|
|
|
|
// protect portions of the site based on the pattern
|
|
|
|
$relativeURL = self::makeRelative(Director::absoluteURL($_SERVER['REQUEST_URI']));
|
|
|
|
foreach($patterns as $pattern) {
|
|
|
|
if(preg_match($pattern, $relativeURL)) {
|
|
|
|
$matched = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// protect the entire site
|
|
|
|
$matched = true;
|
|
|
|
}
|
|
|
|
|
2012-09-26 23:34:00 +02:00
|
|
|
if($matched && (!isset($_SERVER['HTTPS']) || $_SERVER['HTTPS'] == 'off')
|
|
|
|
&& !(isset($_SERVER['HTTP_X_FORWARDED_PROTOCOL'])
|
|
|
|
&& strtolower($_SERVER['HTTP_X_FORWARDED_PROTOCOL']) == 'https')) {
|
|
|
|
|
2008-08-20 06:54:24 +02:00
|
|
|
$destURL = str_replace('http:', 'https:', Director::absoluteURL($_SERVER['REQUEST_URI']));
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2010-10-19 02:50:37 +02:00
|
|
|
// This coupling to SapphireTest is necessary to test the destination URL and to not interfere with tests
|
2010-11-30 06:13:09 +01:00
|
|
|
if(class_exists('SapphireTest', false) && SapphireTest::is_running_test()) {
|
2010-10-19 02:32:42 +02:00
|
|
|
return $destURL;
|
|
|
|
} else {
|
2010-10-19 02:50:37 +02:00
|
|
|
if(!headers_sent()) header("Location: $destURL");
|
2012-09-26 23:34:00 +02:00
|
|
|
die("<h1>Your browser is not accepting header redirects</h1>"
|
|
|
|
. "<p>Please <a href=\"$destURL\">click here</a>");
|
2010-10-19 02:32:42 +02:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return false;
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
|
|
|
}
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2007-07-19 12:40:28 +02:00
|
|
|
/**
|
2008-03-03 00:24:10 +01:00
|
|
|
* Force a redirect to a domain starting with "www."
|
2007-07-19 12:40:28 +02:00
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function forceWWW() {
|
2009-06-27 15:08:23 +02:00
|
|
|
if(!Director::isDev() && !Director::isTest() && strpos($_SERVER['HTTP_HOST'], 'www') !== 0) {
|
2012-09-26 23:34:00 +02:00
|
|
|
$destURL = str_replace(Director::protocol(), Director::protocol() . 'www.',
|
|
|
|
Director::absoluteURL($_SERVER['REQUEST_URI']));
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2008-10-14 23:06:15 +02:00
|
|
|
header("Location: $destURL", true, 301);
|
2012-09-26 23:34:00 +02:00
|
|
|
die("<h1>Your browser is not accepting header redirects</h1>"
|
|
|
|
. "<p>Please <a href=\"$destURL\">click here</a>");
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
|
|
|
}
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2007-07-19 12:40:28 +02:00
|
|
|
/**
|
|
|
|
* Checks if the current HTTP-Request is an "Ajax-Request"
|
2012-11-15 23:37:56 +01:00
|
|
|
* by checking for a custom header set by jQuery or
|
2007-07-19 12:40:28 +02:00
|
|
|
* wether a manually set request-parameter 'ajax' is present.
|
2007-09-14 19:47:45 +02:00
|
|
|
*
|
2007-07-19 12:40:28 +02:00
|
|
|
* @return boolean
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function is_ajax() {
|
2007-08-21 00:39:44 +02:00
|
|
|
if(Controller::has_curr()) {
|
2012-04-05 14:44:42 +02:00
|
|
|
return Controller::curr()->getRequest()->isAjax();
|
2007-08-21 00:39:44 +02:00
|
|
|
} else {
|
|
|
|
return (
|
|
|
|
isset($_REQUEST['ajax']) ||
|
|
|
|
(isset($_SERVER['HTTP_X_REQUESTED_WITH']) && $_SERVER['HTTP_X_REQUESTED_WITH'] == "XMLHttpRequest")
|
|
|
|
);
|
|
|
|
}
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
2007-11-11 03:54:19 +01:00
|
|
|
|
|
|
|
/**
|
2008-02-25 03:10:37 +01:00
|
|
|
* Returns true if this script is being run from the command line rather than the webserver.
|
|
|
|
*
|
2007-11-11 03:54:19 +01:00
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public static function is_cli() {
|
2010-04-13 01:15:04 +02:00
|
|
|
return (php_sapi_name() == "cli");
|
2007-11-11 03:54:19 +01:00
|
|
|
}
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2008-02-25 03:10:37 +01:00
|
|
|
////////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
// Environment type methods
|
|
|
|
////////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
|
2007-07-19 12:40:28 +02:00
|
|
|
/**
|
2008-02-25 03:10:37 +01:00
|
|
|
* Set the environment type of the current site.
|
|
|
|
*
|
|
|
|
* Typically, a SilverStripe site have a number of environments:
|
|
|
|
* - development environments, such a copy on your local machine.
|
|
|
|
* - test sites, such as the one you show the client before going live.
|
|
|
|
* - the live site itself.
|
|
|
|
*
|
2012-09-26 23:34:00 +02:00
|
|
|
* The behaviour of these environments often varies slightly. For example, development sites may have errors
|
|
|
|
* dumped to the screen, and order confirmation emails might be sent to the developer instead of the client.
|
2008-02-25 03:10:37 +01:00
|
|
|
*
|
2012-09-26 23:34:00 +02:00
|
|
|
* To help with this, SilverStripe supports the notion of an environment type. The environment type can be dev,
|
|
|
|
* test, or live.
|
2008-02-25 03:10:37 +01:00
|
|
|
*
|
2012-09-26 23:34:00 +02:00
|
|
|
* You can set it explicitly with Director::set_environment_tpye(). Or you can use
|
|
|
|
* {@link Director::set_dev_servers()} and {@link Director::set_test_servers()} to set it implicitly, based on the
|
|
|
|
* value of $_SERVER['HTTP_HOST']. If the HTTP_HOST value is one of the servers listed, then the environment type
|
|
|
|
* will be test or dev. Otherwise, the environment type will be live.
|
2008-02-25 03:10:37 +01:00
|
|
|
*
|
2012-09-26 23:34:00 +02:00
|
|
|
* Dev mode can also be forced by putting ?isDev=1 in your URL, which will ask you to log in and then push the
|
|
|
|
* site into dev mode for the remainder of the session. Putting ?isDev=0 onto the URL can turn it back.
|
2009-05-21 02:14:47 +02:00
|
|
|
*
|
2012-09-26 23:34:00 +02:00
|
|
|
* Test mode can also be forced by putting ?isTest=1 in your URL, which will ask you to log in and then push the
|
|
|
|
* site into test mode for the remainder of the session. Putting ?isTest=0 onto the URL can turn it back.
|
2009-05-21 02:14:47 +02:00
|
|
|
*
|
2008-02-25 03:10:37 +01:00
|
|
|
* Generally speaking, these methods will be called from your _config.php file.
|
|
|
|
*
|
2012-09-26 23:34:00 +02:00
|
|
|
* Once the environment type is set, it can be checked with {@link Director::isDev()}, {@link Director::isTest()},
|
|
|
|
* and {@link Director::isLive()}.
|
2008-02-25 03:10:37 +01:00
|
|
|
*
|
|
|
|
* @param $et string The environment type: dev, test, or live.
|
2007-07-19 12:40:28 +02:00
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function set_environment_type($et) {
|
2007-07-19 12:40:28 +02:00
|
|
|
if($et != 'dev' && $et != 'test' && $et != 'live') {
|
2012-09-26 23:34:00 +02:00
|
|
|
user_error("Director::set_environment_type passed '$et'. It should be passed dev, test, or live",
|
|
|
|
E_USER_WARNING);
|
2007-07-19 12:40:28 +02:00
|
|
|
} else {
|
|
|
|
self::$environment_type = $et;
|
|
|
|
}
|
|
|
|
}
|
2008-10-01 16:40:29 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Can also be checked with {@link Director::isDev()}, {@link Director::isTest()}, and {@link Director::isLive()}.
|
|
|
|
*
|
|
|
|
* @return string 'dev', 'test' or 'live'
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function get_environment_type() {
|
2008-10-01 16:40:29 +02:00
|
|
|
if(Director::isLive()) {
|
|
|
|
return 'live';
|
|
|
|
} elseif(Director::isTest()) {
|
|
|
|
return 'test';
|
|
|
|
} elseif(Director::isDev()) {
|
|
|
|
return 'dev';
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
2007-09-14 19:47:45 +02:00
|
|
|
|
2008-02-25 03:10:37 +01:00
|
|
|
/*
|
|
|
|
* This function will return true if the site is in a live environment.
|
|
|
|
* For information about environment types, see {@link Director::set_environment_type()}.
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function isLive() {
|
2007-07-19 12:40:28 +02:00
|
|
|
return !(Director::isDev() || Director::isTest());
|
|
|
|
}
|
2007-11-10 06:17:30 +01:00
|
|
|
|
2008-02-25 03:10:37 +01:00
|
|
|
/**
|
|
|
|
* This function will return true if the site is in a development environment.
|
|
|
|
* For information about environment types, see {@link Director::set_environment_type()}.
|
2012-03-09 02:15:34 +01:00
|
|
|
* @param $dontTouchDB If true, the database checks are not performed, which allows certain DB checks
|
|
|
|
* to not fail before the DB is ready. If false (default), DB checks are included.
|
2008-02-25 03:10:37 +01:00
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function isDev($dontTouchDB = false) {
|
2009-06-08 01:07:25 +02:00
|
|
|
// This variable is used to supress repetitions of the isDev security message below.
|
|
|
|
static $firstTimeCheckingGetVar = true;
|
2012-03-09 02:15:34 +01:00
|
|
|
|
|
|
|
$result = false;
|
|
|
|
|
|
|
|
if(isset($_SESSION['isDev']) && $_SESSION['isDev']) $result = true;
|
|
|
|
if(self::$environment_type && self::$environment_type == 'dev') $result = true;
|
|
|
|
|
2007-07-19 12:40:28 +02:00
|
|
|
// Use ?isDev=1 to get development access on the live server
|
2012-03-09 02:15:34 +01:00
|
|
|
if(!$dontTouchDB && !$result && isset($_GET['isDev'])) {
|
2008-11-06 05:51:25 +01:00
|
|
|
if(Security::database_is_ready()) {
|
2010-04-13 03:45:00 +02:00
|
|
|
if($firstTimeCheckingGetVar && !Permission::check('ADMIN')){
|
|
|
|
BasicAuth::requireLogin("SilverStripe developer access. Use your CMS login", "ADMIN");
|
|
|
|
}
|
2007-07-19 12:40:28 +02:00
|
|
|
$_SESSION['isDev'] = $_GET['isDev'];
|
2012-03-09 02:15:34 +01:00
|
|
|
$firstTimeCheckingGetVar = false;
|
|
|
|
$result = $_GET['isDev'];
|
2007-07-19 12:40:28 +02:00
|
|
|
} else {
|
2009-06-08 01:07:25 +02:00
|
|
|
if($firstTimeCheckingGetVar && DB::connection_attempted()) {
|
2012-12-08 12:20:20 +01:00
|
|
|
echo "<p style=\"padding: 3px; margin: 3px; background-color: orange;
|
2009-06-08 01:07:25 +02:00
|
|
|
color: white; font-weight: bold\">Sorry, you can't use ?isDev=1 until your
|
|
|
|
Member and Group tables database are available. Perhaps your database
|
|
|
|
connection is failing?</p>";
|
|
|
|
$firstTimeCheckingGetVar = false;
|
|
|
|
}
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
|
|
|
}
|
2008-11-18 02:48:37 +01:00
|
|
|
|
2012-03-09 02:15:34 +01:00
|
|
|
return $result;
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
2007-09-27 23:50:10 +02:00
|
|
|
|
2008-02-25 03:10:37 +01:00
|
|
|
/**
|
|
|
|
* This function will return true if the site is in a test environment.
|
|
|
|
* For information about environment types, see {@link Director::set_environment_type()}.
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public static function isTest() {
|
2009-05-21 02:14:47 +02:00
|
|
|
// Use ?isTest=1 to get test access on the live server, or explicitly set your environment
|
|
|
|
if(isset($_GET['isTest'])) {
|
|
|
|
if(Security::database_is_ready()) {
|
2009-10-27 08:27:22 +01:00
|
|
|
BasicAuth::requireLogin("SilverStripe developer access. Use your CMS login", "ADMIN");
|
2009-05-21 02:14:47 +02:00
|
|
|
$_SESSION['isTest'] = $_GET['isTest'];
|
|
|
|
} else {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
2008-11-18 02:48:37 +01:00
|
|
|
if(self::isDev()) return false;
|
|
|
|
|
2007-09-27 23:50:10 +02:00
|
|
|
if(self::$environment_type) {
|
|
|
|
return self::$environment_type == 'test';
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if we are running on one of the test servers
|
2008-11-22 04:33:00 +01:00
|
|
|
if(isset($_SERVER['HTTP_HOST']) && in_array($_SERVER['HTTP_HOST'], Director::$test_servers)) {
|
2007-09-27 23:50:10 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
2007-07-19 12:40:28 +02:00
|
|
|
}
|
|
|
|
|
2012-02-11 03:08:39 +01:00
|
|
|
/**
|
|
|
|
* @return array Returns an array of strings of the method names of methods on the call that should be exposed
|
|
|
|
* as global variables in the templates.
|
|
|
|
*/
|
2012-02-21 01:36:34 +01:00
|
|
|
public static function get_template_global_variables() {
|
2012-02-11 03:08:39 +01:00
|
|
|
return array(
|
|
|
|
'absoluteBaseURL',
|
|
|
|
'baseURL',
|
|
|
|
'is_ajax',
|
|
|
|
'isAjax' => 'is_ajax',
|
|
|
|
'BaseHref' => 'absoluteBaseURL', //@deprecated 3.0
|
|
|
|
);
|
|
|
|
}
|
2012-02-27 22:14:02 +01:00
|
|
|
}
|