1436d8dab7
This change removes the need for the {_locale} hack. Now, all paths in the Security component can be: * An absolute path (/login) * An absolute URL (http://symfony.com/login) * A route name (login) So, if you want to use a path that includes a global parameter (like _locale), use a route instead of a path.
623 lines
24 KiB
PHP
623 lines
24 KiB
PHP
<?php
|
|
|
|
/*
|
|
* This file is part of the Symfony package.
|
|
*
|
|
* (c) Fabien Potencier <fabien@symfony.com>
|
|
*
|
|
* For the full copyright and license information, please view the LICENSE
|
|
* file that was distributed with this source code.
|
|
*/
|
|
|
|
namespace Symfony\Bundle\SecurityBundle\DependencyInjection;
|
|
|
|
use Symfony\Component\DependencyInjection\DefinitionDecorator;
|
|
use Symfony\Component\DependencyInjection\Alias;
|
|
use Symfony\Component\HttpKernel\DependencyInjection\Extension;
|
|
use Symfony\Component\DependencyInjection\Loader\XmlFileLoader;
|
|
use Symfony\Component\DependencyInjection\Loader\YamlFileLoader;
|
|
use Symfony\Component\DependencyInjection\Loader\PhpFileLoader;
|
|
use Symfony\Component\Config\Loader\DelegatingLoader;
|
|
use Symfony\Component\Config\Loader\LoaderResolver;
|
|
use Symfony\Component\DependencyInjection\ContainerBuilder;
|
|
use Symfony\Component\DependencyInjection\Reference;
|
|
use Symfony\Component\DependencyInjection\Parameter;
|
|
use Symfony\Component\Config\FileLocator;
|
|
use Symfony\Component\Config\Definition\Processor;
|
|
|
|
/**
|
|
* SecurityExtension.
|
|
*
|
|
* @author Fabien Potencier <fabien@symfony.com>
|
|
* @author Johannes M. Schmitt <schmittjoh@gmail.com>
|
|
*/
|
|
class SecurityExtension extends Extension
|
|
{
|
|
private $requestMatchers = array();
|
|
private $contextListeners = array();
|
|
private $listenerPositions = array('pre_auth', 'form', 'http', 'remember_me');
|
|
private $factories;
|
|
|
|
public function load(array $configs, ContainerBuilder $container)
|
|
{
|
|
if (!array_filter($configs)) {
|
|
return;
|
|
}
|
|
|
|
$processor = new Processor();
|
|
|
|
// first assemble the factories
|
|
$factoriesConfig = new FactoryConfiguration();
|
|
$config = $processor->processConfiguration($factoriesConfig, $configs);
|
|
$factories = $this->createListenerFactories($container, $config);
|
|
|
|
// normalize and merge the actual configuration
|
|
$mainConfig = new MainConfiguration($factories);
|
|
$config = $processor->processConfiguration($mainConfig, $configs);
|
|
|
|
// load services
|
|
$loader = new XmlFileLoader($container, new FileLocator(__DIR__.'/../Resources/config'));
|
|
$loader->load('security.xml');
|
|
$loader->load('security_listeners.xml');
|
|
$loader->load('security_rememberme.xml');
|
|
$loader->load('templating_php.xml');
|
|
$loader->load('templating_twig.xml');
|
|
$loader->load('collectors.xml');
|
|
|
|
// set some global scalars
|
|
$container->setParameter('security.access.denied_url', $config['access_denied_url']);
|
|
$container->setParameter('security.authentication.session_strategy.strategy', $config['session_fixation_strategy']);
|
|
$container
|
|
->getDefinition('security.access.decision_manager')
|
|
->addArgument($config['access_decision_manager']['strategy'])
|
|
->addArgument($config['access_decision_manager']['allow_if_all_abstain'])
|
|
->addArgument($config['access_decision_manager']['allow_if_equal_granted_denied'])
|
|
;
|
|
$container->setParameter('security.access.always_authenticate_before_granting', $config['always_authenticate_before_granting']);
|
|
$container->setParameter('security.authentication.hide_user_not_found', $config['hide_user_not_found']);
|
|
|
|
$this->createFirewalls($config, $container);
|
|
$this->createAuthorization($config, $container);
|
|
$this->createRoleHierarchy($config, $container);
|
|
|
|
if ($config['encoders']) {
|
|
$this->createEncoders($config['encoders'], $container);
|
|
}
|
|
|
|
// load ACL
|
|
if (isset($config['acl'])) {
|
|
$this->aclLoad($config['acl'], $container);
|
|
}
|
|
|
|
// add some required classes for compilation
|
|
$this->addClassesToCompile(array(
|
|
'Symfony\\Component\\Security\\Http\\Firewall',
|
|
'Symfony\\Component\\Security\\Http\\FirewallMapInterface',
|
|
'Symfony\\Component\\Security\\Core\\SecurityContext',
|
|
'Symfony\\Component\\Security\\Core\\SecurityContextInterface',
|
|
'Symfony\\Component\\Security\\Core\\User\\UserProviderInterface',
|
|
'Symfony\\Component\\Security\\Core\\Authentication\\AuthenticationProviderManager',
|
|
'Symfony\\Component\\Security\\Core\\Authentication\\AuthenticationManagerInterface',
|
|
'Symfony\\Component\\Security\\Core\\Authorization\\AccessDecisionManager',
|
|
'Symfony\\Component\\Security\\Core\\Authorization\\AccessDecisionManagerInterface',
|
|
'Symfony\\Component\\Security\\Core\\Authorization\\Voter\\VoterInterface',
|
|
|
|
'Symfony\\Bundle\\SecurityBundle\\Security\\FirewallMap',
|
|
'Symfony\\Bundle\\SecurityBundle\\Security\\FirewallContext',
|
|
|
|
'Symfony\\Component\\HttpFoundation\\RequestMatcher',
|
|
'Symfony\\Component\\HttpFoundation\\RequestMatcherInterface',
|
|
));
|
|
}
|
|
|
|
private function aclLoad($config, ContainerBuilder $container)
|
|
{
|
|
$loader = new XmlFileLoader($container, new FileLocator(__DIR__.'/../Resources/config'));
|
|
$loader->load('security_acl.xml');
|
|
|
|
if (isset($config['cache']['id'])) {
|
|
$container->setAlias('security.acl.cache', $config['cache']['id']);
|
|
}
|
|
$container->getDefinition('security.acl.voter.basic_permissions')->addArgument($config['voter']['allow_if_object_identity_unavailable']);
|
|
|
|
// custom ACL provider
|
|
if (isset($config['provider'])) {
|
|
$container->setAlias('security.acl.provider', $config['provider']);
|
|
|
|
return;
|
|
}
|
|
|
|
$this->configureDbalAclProvider($config, $container, $loader);
|
|
}
|
|
|
|
private function configureDbalAclProvider(array $config, ContainerBuilder $container, $loader)
|
|
{
|
|
$loader->load('security_acl_dbal.xml');
|
|
|
|
if (isset($config['connection'])) {
|
|
$container->setAlias('security.acl.dbal.connection', sprintf('doctrine.dbal.%s_connection', $config['connection']));
|
|
}
|
|
$container->getDefinition('security.acl.cache.doctrine')->addArgument($config['cache']['prefix']);
|
|
|
|
$container->setParameter('security.acl.dbal.class_table_name', $config['tables']['class']);
|
|
$container->setParameter('security.acl.dbal.entry_table_name', $config['tables']['entry']);
|
|
$container->setParameter('security.acl.dbal.oid_table_name', $config['tables']['object_identity']);
|
|
$container->setParameter('security.acl.dbal.oid_ancestors_table_name', $config['tables']['object_identity_ancestors']);
|
|
$container->setParameter('security.acl.dbal.sid_table_name', $config['tables']['security_identity']);
|
|
}
|
|
|
|
/**
|
|
* Loads the web configuration.
|
|
*
|
|
* @param array $config An array of configuration settings
|
|
* @param ContainerBuilder $container A ContainerBuilder instance
|
|
*/
|
|
|
|
private function createRoleHierarchy($config, ContainerBuilder $container)
|
|
{
|
|
if (!isset($config['role_hierarchy'])) {
|
|
$container->removeDefinition('security.access.role_hierarchy_voter');
|
|
|
|
return;
|
|
}
|
|
|
|
$container->setParameter('security.role_hierarchy.roles', $config['role_hierarchy']);
|
|
$container->removeDefinition('security.access.simple_role_voter');
|
|
}
|
|
|
|
private function createAuthorization($config, ContainerBuilder $container)
|
|
{
|
|
if (!$config['access_control']) {
|
|
return;
|
|
}
|
|
|
|
$this->addClassesToCompile(array(
|
|
'Symfony\\Component\\Security\\Http\\AccessMap',
|
|
));
|
|
|
|
foreach ($config['access_control'] as $access) {
|
|
$matcher = $this->createRequestMatcher(
|
|
$container,
|
|
$access['path'],
|
|
$access['host'],
|
|
count($access['methods']) === 0 ? null : $access['methods'],
|
|
$access['ip']
|
|
);
|
|
|
|
$container->getDefinition('security.access_map')
|
|
->addMethodCall('add', array($matcher, $access['roles'], $access['requires_channel']));
|
|
}
|
|
}
|
|
|
|
private function createFirewalls($config, ContainerBuilder $container)
|
|
{
|
|
if (!isset($config['firewalls'])) {
|
|
return;
|
|
}
|
|
|
|
$firewalls = $config['firewalls'];
|
|
$providerIds = $this->createUserProviders($config, $container);
|
|
|
|
// make the ContextListener aware of the configured user providers
|
|
$definition = $container->getDefinition('security.context_listener');
|
|
$arguments = $definition->getArguments();
|
|
$userProviders = array();
|
|
foreach ($providerIds as $userProviderId) {
|
|
$userProviders[] = new Reference($userProviderId);
|
|
}
|
|
$arguments[1] = $userProviders;
|
|
$definition->setArguments($arguments);
|
|
|
|
// create security listener factories
|
|
$factories = $this->createListenerFactories($container, $config);
|
|
|
|
// load firewall map
|
|
$mapDef = $container->getDefinition('security.firewall.map');
|
|
$map = $authenticationProviders = array();
|
|
foreach ($firewalls as $name => $firewall) {
|
|
list($matcher, $listeners, $exceptionListener) = $this->createFirewall($container, $name, $firewall, $authenticationProviders, $providerIds, $factories);
|
|
|
|
$contextId = 'security.firewall.map.context.'.$name;
|
|
$context = $container->setDefinition($contextId, new DefinitionDecorator('security.firewall.context'));
|
|
$context
|
|
->replaceArgument(0, $listeners)
|
|
->replaceArgument(1, $exceptionListener)
|
|
;
|
|
$map[$contextId] = $matcher;
|
|
}
|
|
$mapDef->replaceArgument(1, $map);
|
|
|
|
// add authentication providers to authentication manager
|
|
$authenticationProviders = array_map(function($id) {
|
|
return new Reference($id);
|
|
}, array_values(array_unique($authenticationProviders)));
|
|
$container
|
|
->getDefinition('security.authentication.manager')
|
|
->replaceArgument(0, $authenticationProviders)
|
|
;
|
|
}
|
|
|
|
private function createFirewall(ContainerBuilder $container, $id, $firewall, &$authenticationProviders, $providerIds, array $factories)
|
|
{
|
|
// Matcher
|
|
$i = 0;
|
|
$matcher = null;
|
|
if (isset($firewall['request_matcher'])) {
|
|
$matcher = new Reference($firewall['request_matcher']);
|
|
} else if (isset($firewall['pattern'])) {
|
|
$matcher = $this->createRequestMatcher($container, $firewall['pattern']);
|
|
}
|
|
|
|
// Security disabled?
|
|
if (false === $firewall['security']) {
|
|
return array($matcher, array(), null);
|
|
}
|
|
|
|
// Provider id (take the first registered provider if none defined)
|
|
if (isset($firewall['provider'])) {
|
|
$defaultProvider = $this->getUserProviderId($firewall['provider']);
|
|
} else {
|
|
$defaultProvider = reset($providerIds);
|
|
}
|
|
|
|
// Register listeners
|
|
$listeners = array();
|
|
|
|
// Channel listener
|
|
$listeners[] = new Reference('security.channel_listener');
|
|
|
|
// Context serializer listener
|
|
if (false === $firewall['stateless']) {
|
|
$contextKey = $id;
|
|
if (isset($firewall['context'])) {
|
|
$contextKey = $firewall['context'];
|
|
}
|
|
|
|
$listeners[] = new Reference($this->createContextListener($container, $contextKey));
|
|
}
|
|
|
|
// Logout listener
|
|
if (isset($firewall['logout'])) {
|
|
$listenerId = 'security.logout_listener.'.$id;
|
|
$listener = $container->setDefinition($listenerId, new DefinitionDecorator('security.logout_listener'));
|
|
$listener->replaceArgument(2, $firewall['logout']['path']);
|
|
$listener->replaceArgument(3, $firewall['logout']['target']);
|
|
$listeners[] = new Reference($listenerId);
|
|
|
|
// add logout success handler
|
|
if (isset($firewall['logout']['success_handler'])) {
|
|
$listener->replaceArgument(4, new Reference($firewall['logout']['success_handler']));
|
|
}
|
|
|
|
// add session logout handler
|
|
if (true === $firewall['logout']['invalidate_session'] && false === $firewall['stateless']) {
|
|
$listener->addMethodCall('addHandler', array(new Reference('security.logout.handler.session')));
|
|
}
|
|
|
|
// add cookie logout handler
|
|
if (count($firewall['logout']['delete_cookies']) > 0) {
|
|
$cookieHandlerId = 'security.logout.handler.cookie_clearing.'.$id;
|
|
$cookieHandler = $container->setDefinition($cookieHandlerId, new DefinitionDecorator('security.logout.handler.cookie_clearing'));
|
|
$cookieHandler->addArgument($firewall['logout']['delete_cookies']);
|
|
|
|
$listener->addMethodCall('addHandler', array(new Reference($cookieHandlerId)));
|
|
}
|
|
|
|
// add custom handlers
|
|
foreach ($firewall['logout']['handlers'] as $handlerId) {
|
|
$listener->addMethodCall('addHandler', array(new Reference($handlerId)));
|
|
}
|
|
}
|
|
|
|
// Authentication listeners
|
|
list($authListeners, $defaultEntryPoint) = $this->createAuthenticationListeners($container, $id, $firewall, $authenticationProviders, $defaultProvider, $factories);
|
|
|
|
$listeners = array_merge($listeners, $authListeners);
|
|
|
|
// Access listener
|
|
$listeners[] = new Reference('security.access_listener');
|
|
|
|
// Switch user listener
|
|
if (isset($firewall['switch_user'])) {
|
|
$listeners[] = new Reference($this->createSwitchUserListener($container, $id, $firewall['switch_user'], $defaultProvider));
|
|
}
|
|
|
|
// Determine default entry point
|
|
if (isset($firewall['entry_point'])) {
|
|
$defaultEntryPoint = $firewall['entry_point'];
|
|
}
|
|
|
|
// Exception listener
|
|
$exceptionListener = new Reference($this->createExceptionListener($container, $firewall, $id, $defaultEntryPoint));
|
|
|
|
return array($matcher, $listeners, $exceptionListener);
|
|
}
|
|
|
|
private function createContextListener($container, $contextKey)
|
|
{
|
|
if (isset($this->contextListeners[$contextKey])) {
|
|
return $this->contextListeners[$contextKey];
|
|
}
|
|
|
|
$listenerId = 'security.context_listener.'.count($this->contextListeners);
|
|
$listener = $container->setDefinition($listenerId, new DefinitionDecorator('security.context_listener'));
|
|
$listener->replaceArgument(2, $contextKey);
|
|
|
|
return $this->contextListeners[$contextKey] = $listenerId;
|
|
}
|
|
|
|
private function createAuthenticationListeners($container, $id, $firewall, &$authenticationProviders, $defaultProvider, array $factories)
|
|
{
|
|
$listeners = array();
|
|
$hasListeners = false;
|
|
$defaultEntryPoint = null;
|
|
|
|
foreach ($this->listenerPositions as $position) {
|
|
foreach ($factories[$position] as $factory) {
|
|
$key = str_replace('-', '_', $factory->getKey());
|
|
|
|
if (isset($firewall[$key])) {
|
|
$userProvider = isset($firewall[$key]['provider']) ? $this->getUserProviderId($firewall[$key]['provider']) : $defaultProvider;
|
|
|
|
list($provider, $listenerId, $defaultEntryPoint) = $factory->create($container, $id, $firewall[$key], $userProvider, $defaultEntryPoint);
|
|
|
|
$listeners[] = new Reference($listenerId);
|
|
$authenticationProviders[] = $provider;
|
|
$hasListeners = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Anonymous
|
|
if (isset($firewall['anonymous'])) {
|
|
$listenerId = 'security.authentication.listener.anonymous.'.$id;
|
|
$container
|
|
->setDefinition($listenerId, new DefinitionDecorator('security.authentication.listener.anonymous'))
|
|
->replaceArgument(1, $firewall['anonymous']['key'])
|
|
;
|
|
|
|
$listeners[] = new Reference($listenerId);
|
|
|
|
$providerId = 'security.authentication.provider.anonymous.'.$id;
|
|
$container
|
|
->setDefinition($providerId, new DefinitionDecorator('security.authentication.provider.anonymous'))
|
|
->replaceArgument(0, $firewall['anonymous']['key'])
|
|
;
|
|
|
|
$authenticationProviders[] = $providerId;
|
|
$hasListeners = true;
|
|
}
|
|
|
|
if (false === $hasListeners) {
|
|
throw new \LogicException(sprintf('No authentication listener registered for firewall "%s".', $id));
|
|
}
|
|
|
|
return array($listeners, $defaultEntryPoint);
|
|
}
|
|
|
|
private function createEncoders($encoders, ContainerBuilder $container)
|
|
{
|
|
$encoderMap = array();
|
|
foreach ($encoders as $class => $encoder) {
|
|
$encoderMap[$class] = $this->createEncoder($encoder, $container);
|
|
}
|
|
|
|
$container
|
|
->getDefinition('security.encoder_factory.generic')
|
|
->setArguments(array($encoderMap))
|
|
;
|
|
}
|
|
|
|
private function createEncoder($config, ContainerBuilder $container)
|
|
{
|
|
// a custom encoder service
|
|
if (isset($config['id'])) {
|
|
return new Reference($config['id']);
|
|
}
|
|
|
|
// plaintext encoder
|
|
if ('plaintext' === $config['algorithm']) {
|
|
$arguments = array($config['ignore_case']);
|
|
|
|
return array(
|
|
'class' => new Parameter('security.encoder.plain.class'),
|
|
'arguments' => $arguments,
|
|
);
|
|
}
|
|
|
|
// message digest encoder
|
|
$arguments = array(
|
|
$config['algorithm'],
|
|
$config['encode_as_base64'],
|
|
$config['iterations'],
|
|
);
|
|
|
|
return array(
|
|
'class' => new Parameter('security.encoder.digest.class'),
|
|
'arguments' => $arguments,
|
|
);
|
|
}
|
|
|
|
// Parses user providers and returns an array of their ids
|
|
private function createUserProviders($config, ContainerBuilder $container)
|
|
{
|
|
$providerIds = array();
|
|
foreach ($config['providers'] as $name => $provider) {
|
|
$id = $this->createUserDaoProvider($name, $provider, $container);
|
|
$providerIds[] = $id;
|
|
}
|
|
|
|
return $providerIds;
|
|
}
|
|
|
|
// Parses a <provider> tag and returns the id for the related user provider service
|
|
private function createUserDaoProvider($name, $provider, ContainerBuilder $container, $master = true)
|
|
{
|
|
$name = $this->getUserProviderId(strtolower($name));
|
|
|
|
// Existing DAO service provider
|
|
if (isset($provider['id'])) {
|
|
$container->setAlias($name, new Alias($provider['id'], false));
|
|
|
|
return $provider['id'];
|
|
}
|
|
|
|
// Chain provider
|
|
if ($provider['providers']) {
|
|
$providers = array();
|
|
foreach ($provider['providers'] as $providerName) {
|
|
$providers[] = new Reference($this->getUserProviderId(strtolower($providerName)));
|
|
}
|
|
|
|
$container
|
|
->setDefinition($name, new DefinitionDecorator('security.user.provider.chain'))
|
|
->addArgument($providers)
|
|
;
|
|
|
|
return $name;
|
|
}
|
|
|
|
// Doctrine Entity DAO provider
|
|
if (isset($provider['entity'])) {
|
|
$container
|
|
->setDefinition($name, new DefinitionDecorator('security.user.provider.entity'))
|
|
->addArgument($provider['entity']['class'])
|
|
->addArgument($provider['entity']['property'])
|
|
;
|
|
|
|
return $name;
|
|
}
|
|
|
|
// In-memory DAO provider
|
|
$definition = $container->setDefinition($name, new DefinitionDecorator('security.user.provider.in_memory'));
|
|
foreach ($provider['users'] as $username => $user) {
|
|
$userId = $name.'_'.$username;
|
|
|
|
$container
|
|
->setDefinition($userId, new DefinitionDecorator('security.user.provider.in_memory.user'))
|
|
->setArguments(array($username, (string)$user['password'], $user['roles']))
|
|
;
|
|
|
|
$definition->addMethodCall('createUser', array(new Reference($userId)));
|
|
}
|
|
|
|
return $name;
|
|
}
|
|
|
|
private function getUserProviderId($name)
|
|
{
|
|
return 'security.user.provider.concrete.'.$name;
|
|
}
|
|
|
|
private function createExceptionListener($container, $config, $id, $defaultEntryPoint)
|
|
{
|
|
$exceptionListenerId = 'security.exception_listener.'.$id;
|
|
$listener = $container->setDefinition($exceptionListenerId, new DefinitionDecorator('security.exception_listener'));
|
|
$listener->replaceArgument(3, null === $defaultEntryPoint ? null : new Reference($defaultEntryPoint));
|
|
|
|
// access denied handler setup
|
|
if (isset($config['access_denied_handler'])) {
|
|
$listener->replaceArgument(5, new Reference($config['access_denied_handler']));
|
|
} else if (isset($config['access_denied_url'])) {
|
|
$listener->replaceArgument(4, $config['access_denied_url']);
|
|
}
|
|
|
|
return $exceptionListenerId;
|
|
}
|
|
|
|
private function createSwitchUserListener($container, $id, $config, $defaultProvider)
|
|
{
|
|
$userProvider = isset($config['provider']) ? $this->getUserProviderId($config['provider']) : $defaultProvider;
|
|
|
|
$switchUserListenerId = 'security.authentication.switchuser_listener.'.$id;
|
|
$listener = $container->setDefinition($switchUserListenerId, new DefinitionDecorator('security.authentication.switchuser_listener'));
|
|
$listener->replaceArgument(1, new Reference($userProvider));
|
|
$listener->replaceArgument(3, $id);
|
|
$listener->replaceArgument(6, $config['parameter']);
|
|
$listener->replaceArgument(7, $config['role']);
|
|
|
|
return $switchUserListenerId;
|
|
}
|
|
|
|
private function createRequestMatcher($container, $path = null, $host = null, $methods = null, $ip = null, array $attributes = array())
|
|
{
|
|
$serialized = serialize(array($path, $host, $methods, $ip, $attributes));
|
|
$id = 'security.request_matcher.'.md5($serialized).sha1($serialized);
|
|
|
|
if (isset($this->requestMatchers[$id])) {
|
|
return $this->requestMatchers[$id];
|
|
}
|
|
|
|
// only add arguments that are necessary
|
|
$arguments = array($path, $host, $methods, $ip, $attributes);
|
|
while (count($arguments) > 0 && !end($arguments)) {
|
|
array_pop($arguments);
|
|
}
|
|
|
|
$container
|
|
->register($id, '%security.matcher.class%')
|
|
->setPublic(false)
|
|
->setArguments($arguments)
|
|
;
|
|
|
|
return $this->requestMatchers[$id] = new Reference($id);
|
|
}
|
|
|
|
private function createListenerFactories(ContainerBuilder $container, $config)
|
|
{
|
|
if (null !== $this->factories) {
|
|
return $this->factories;
|
|
}
|
|
|
|
// load service templates
|
|
$c = new ContainerBuilder();
|
|
$parameterBag = $container->getParameterBag();
|
|
|
|
$locator = new FileLocator(__DIR__.'/../Resources/config');
|
|
$resolver = new LoaderResolver(array(
|
|
new XmlFileLoader($c, $locator),
|
|
new YamlFileLoader($c, $locator),
|
|
new PhpFileLoader($c, $locator),
|
|
));
|
|
$loader = new DelegatingLoader($resolver);
|
|
|
|
$loader->load('security_factories.xml');
|
|
|
|
// load user-created listener factories
|
|
foreach ($config['factories'] as $factory) {
|
|
$loader->load($parameterBag->resolveValue($factory));
|
|
}
|
|
|
|
$tags = $c->findTaggedServiceIds('security.listener.factory');
|
|
|
|
$factories = array();
|
|
foreach ($this->listenerPositions as $position) {
|
|
$factories[$position] = array();
|
|
}
|
|
|
|
foreach (array_keys($tags) as $tag) {
|
|
$factory = $c->get($tag);
|
|
$factories[$factory->getPosition()][] = $factory;
|
|
}
|
|
|
|
return $this->factories = $factories;
|
|
}
|
|
|
|
|
|
/**
|
|
* Returns the base path for the XSD files.
|
|
*
|
|
* @return string The XSD base path
|
|
*/
|
|
public function getXsdValidationBasePath()
|
|
{
|
|
return __DIR__.'/../Resources/config/schema';
|
|
}
|
|
|
|
public function getNamespace()
|
|
{
|
|
return 'http://symfony.com/schema/dic/security';
|
|
}
|
|
}
|
|
|