File "SandboxExtension.php"

Full Path: /home/warrior1/public_html/wp-content/plugins/mailpoet/vendor-prefixed/twig/twig/src/Extension/SandboxExtension.php
File size: 2.52 KB
MIME-type: text/x-php
Charset: utf-8

<?php
namespace MailPoetVendor\Twig\Extension;
if (!defined('ABSPATH')) exit;
use MailPoetVendor\Twig\NodeVisitor\SandboxNodeVisitor;
use MailPoetVendor\Twig\Sandbox\SecurityNotAllowedMethodError;
use MailPoetVendor\Twig\Sandbox\SecurityNotAllowedPropertyError;
use MailPoetVendor\Twig\Sandbox\SecurityPolicyInterface;
use MailPoetVendor\Twig\Source;
use MailPoetVendor\Twig\TokenParser\SandboxTokenParser;
final class SandboxExtension extends AbstractExtension
{
 private $sandboxedGlobally;
 private $sandboxed;
 private $policy;
 public function __construct(SecurityPolicyInterface $policy, $sandboxed = \false)
 {
 $this->policy = $policy;
 $this->sandboxedGlobally = $sandboxed;
 }
 public function getTokenParsers() : array
 {
 return [new SandboxTokenParser()];
 }
 public function getNodeVisitors() : array
 {
 return [new SandboxNodeVisitor()];
 }
 public function enableSandbox() : void
 {
 $this->sandboxed = \true;
 }
 public function disableSandbox() : void
 {
 $this->sandboxed = \false;
 }
 public function isSandboxed() : bool
 {
 return $this->sandboxedGlobally || $this->sandboxed;
 }
 public function isSandboxedGlobally() : bool
 {
 return $this->sandboxedGlobally;
 }
 public function setSecurityPolicy(SecurityPolicyInterface $policy)
 {
 $this->policy = $policy;
 }
 public function getSecurityPolicy() : SecurityPolicyInterface
 {
 return $this->policy;
 }
 public function checkSecurity($tags, $filters, $functions) : void
 {
 if ($this->isSandboxed()) {
 $this->policy->checkSecurity($tags, $filters, $functions);
 }
 }
 public function checkMethodAllowed($obj, $method, int $lineno = -1, Source $source = null) : void
 {
 if ($this->isSandboxed()) {
 try {
 $this->policy->checkMethodAllowed($obj, $method);
 } catch (SecurityNotAllowedMethodError $e) {
 $e->setSourceContext($source);
 $e->setTemplateLine($lineno);
 throw $e;
 }
 }
 }
 public function checkPropertyAllowed($obj, $property, int $lineno = -1, Source $source = null) : void
 {
 if ($this->isSandboxed()) {
 try {
 $this->policy->checkPropertyAllowed($obj, $property);
 } catch (SecurityNotAllowedPropertyError $e) {
 $e->setSourceContext($source);
 $e->setTemplateLine($lineno);
 throw $e;
 }
 }
 }
 public function ensureToStringAllowed($obj, int $lineno = -1, Source $source = null)
 {
 if ($this->isSandboxed() && \is_object($obj) && \method_exists($obj, '__toString')) {
 try {
 $this->policy->checkMethodAllowed($obj, '__toString');
 } catch (SecurityNotAllowedMethodError $e) {
 $e->setSourceContext($source);
 $e->setTemplateLine($lineno);
 throw $e;
 }
 }
 return $obj;
 }
}