123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182 |
- <?php namespace Laravel; use Closure;
- class Request {
- /**
- * The request URI for the current request.
- *
- * @var string
- */
- public static $uri;
- /**
- * The route handling the current request.
- *
- * @var Routing\Route
- */
- public static $route;
- /**
- * The request data key that is used to indicate a spoofed request method.
- *
- * @var string
- */
- const spoofer = '__spoofer';
- /**
- * Get the URI for the current request.
- *
- * If the request is to the root of the application, a single forward slash
- * will be returned. Otherwise, the URI will be returned without any leading
- * or trailing slashes.
- *
- * @return string
- */
- public static function uri()
- {
- if ( ! is_null(static::$uri)) return static::$uri;
- $uri = parse_url($_SERVER['REQUEST_URI'], PHP_URL_PATH);
- // Remove the root application URL from the request URI. If the application
- // is nested within a sub-directory of the web document root, this will get
- // rid of the sub-directories from the request URI.
- $base = parse_url(Config::$items['application']['url'], PHP_URL_PATH);
- if (strpos($uri, $base) === 0)
- {
- $uri = substr($uri, strlen($base));
- }
- // Remove the application index file. It is not used for anything as far
- // as the framework and routing is concerned, so it's worthless.
- $index = '/'.Config::$items['application']['index'];
- if ($index !== '/' and strpos($uri, $index) === 0)
- {
- $uri = substr($uri, strlen($index));
- }
- // Format the final request URI. If there is nothing left, we will just
- // return a single forward slash. Otherwise, we'll remove all of the
- // leading and trailing spaces from the URI.
- return static::$uri = (($uri = trim($uri, '/')) !== '') ? $uri : '/';
- }
- /**
- * Get the request method.
- *
- * This will usually be the value of the REQUEST_METHOD $_SERVER variable
- * However, when the request method is spoofed using a hidden form value,
- * the method will be stored in the $_POST array.
- *
- * @return string
- */
- public static function method()
- {
- return (static::spoofed()) ? $_POST[Request::spoofer] : $_SERVER['REQUEST_METHOD'];
- }
- /**
- * Get an item from the $_SERVER array.
- *
- * Like most array retrieval methods, a default value may be specified.
- *
- * @param string $key
- * @param mixed $default
- * @return string
- */
- public static function server($key = null, $default = null)
- {
- return Arr::get($_SERVER, strtoupper($key), $default);
- }
- /**
- * Determine if the request method is being spoofed by a hidden Form element.
- *
- * @return bool
- */
- public static function spoofed()
- {
- return is_array($_POST) and array_key_exists(Request::spoofer, $_POST);
- }
- /**
- * Get the requestor's IP address.
- *
- * @param mixed $default
- * @return string
- */
- public static function ip($default = '0.0.0.0')
- {
- if (isset($_SERVER['HTTP_X_FORWARDED_FOR']))
- {
- return $_SERVER['HTTP_X_FORWARDED_FOR'];
- }
- elseif (isset($_SERVER['HTTP_CLIENT_IP']))
- {
- return $_SERVER['HTTP_CLIENT_IP'];
- }
- elseif (isset($_SERVER['REMOTE_ADDR']))
- {
- return $_SERVER['REMOTE_ADDR'];
- }
- return ($default instanceof Closure) ? call_user_func($default) : $default;
- }
- /**
- * Get the HTTP protocol for the request.
- *
- * @return string
- */
- public static function protocol()
- {
- return Arr::get($_SERVER, 'SERVER_PROTOCOL', 'HTTP/1.1');
- }
- /**
- * Determine if the current request is using HTTPS.
- *
- * @return bool
- */
- public static function secure()
- {
- return isset($_SERVER['HTTPS']) and strtolower($_SERVER['HTTPS']) !== 'off';
- }
- /**
- * Determine if the request has been forged.
- *
- * The session CSRF token will be compared to the CSRF token in the request input.
- *
- * @return bool
- */
- public static function forged()
- {
- return Input::get('csrf_token') !== Session::token();
- }
- /**
- * Determine if the current request is an AJAX request.
- *
- * @return bool
- */
- public static function ajax()
- {
- if ( ! isset($_SERVER['HTTP_X_REQUESTED_WITH'])) return false;
- return strtolower($_SERVER['HTTP_X_REQUESTED_WITH']) === 'xmlhttprequest';
- }
- /**
- * Get the route handling the current request.
- *
- * @return Route
- */
- public static function route()
- {
- return static::$route;
- }
- }
|