Server IP : 185.86.78.101 / Your IP : 216.73.216.171 Web Server : Apache System : Linux 675867-vds-valikoshka1996.gmhost.pp.ua 5.4.0-150-generic #167-Ubuntu SMP Mon May 15 17:35:05 UTC 2023 x86_64 User : www ( 1000) PHP Version : 7.4.33 Disable Function : passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : OFF Directory : /www/wwwroot/mifepriston.org/vendor/yiisoft/yii2/web/ |
Upload File : |
<?php /** * @link https://www.yiiframework.com/ * @copyright Copyright (c) 2008 Yii Software LLC * @license https://www.yiiframework.com/license/ */ namespace yii\web; /** * IdentityInterface is the interface that should be implemented by a class providing identity information. * * This interface can typically be implemented by a user model class. For example, the following * code shows how to implement this interface by a User ActiveRecord class: * * ```php * class User extends ActiveRecord implements IdentityInterface * { * public static function findIdentity($id) * { * return static::findOne($id); * } * * public static function findIdentityByAccessToken($token, $type = null) * { * return static::findOne(['access_token' => $token]); * } * * public function getId() * { * return $this->id; * } * * public function getAuthKey() * { * return $this->authKey; * } * * public function validateAuthKey($authKey) * { * return $this->authKey === $authKey; * } * } * ``` * * In some situations not all of these methods are required to be implemented. * For example, if your application is a pure stateless RESTful application, * you would only need to implement [[yii\web\IdentityInterface::findIdentityByAccessToken()|findIdentityByAccessToken()]] * and [[yii\web\IdentityInterface::getId()|getId()]] while leaving all other methods with an empty body. * Or if your application uses session only authentication, you would need to implement all the methods * except [[yii\web\IdentityInterface::findIdentityByAccessToken()|findIdentityByAccessToken()]]. * * @author Qiang Xue <qiang.xue@gmail.com> * @since 2.0 */ interface IdentityInterface { /** * Finds an identity by the given ID. * @param string|int $id the ID to be looked for * @return IdentityInterface|null the identity object that matches the given ID. * Null should be returned if such an identity cannot be found * or the identity is not in an active state (disabled, deleted, etc.) */ public static function findIdentity($id); /** * Finds an identity by the given token. * @param mixed $token the token to be looked for * @param mixed $type the type of the token. The value of this parameter depends on the implementation. * For example, [[\yii\filters\auth\HttpBearerAuth]] will set this parameter to be `yii\filters\auth\HttpBearerAuth`. * @return IdentityInterface|null the identity object that matches the given token. * Null should be returned if such an identity cannot be found * or the identity is not in an active state (disabled, deleted, etc.) */ public static function findIdentityByAccessToken($token, $type = null); /** * Returns an ID that can uniquely identify a user identity. * @return string|int an ID that uniquely identifies a user identity. */ public function getId(); /** * Returns a key that can be used to check the validity of a given identity ID. * * The key should be unique for each individual user, and should be persistent * so that it can be used to check the validity of the user identity. * * The space of such keys should be big enough to defeat potential identity attacks. * * The returned key is used to validate session and auto-login (if [[User::enableAutoLogin]] is enabled). * * Make sure to invalidate earlier issued authKeys when you implement force user logout, password change and * other scenarios, that require forceful access revocation for old sessions. * * @return string|null a key that is used to check the validity of a given identity ID. * @see validateAuthKey() */ public function getAuthKey(); /** * Validates the given auth key. * * @param string $authKey the given auth key * @return bool|null whether the given auth key is valid. * @see getAuthKey() */ public function validateAuthKey($authKey); }