public function close() { $this->active = false; return (bool) $this->handler->close(); } public function read($id) { return (string) $this->handler->read($id); } public function write($id, $data)
public function close() { $this->active = false; return (bool) $this->handler->close(); } public function read($id) { return (string) $this->handler->read($id); } public function write($id, $data)
} if (version_compare(phpversion(), '5.4.0', '<') && isset($_SESSION) && session_id()) { throw new \RuntimeException('Failed to start the session: already started by PHP ($_SESSION is set).'); } if (ini_get('session.use_cookies') && headers_sent($file, $line)) { throw new \RuntimeException(sprintf('Failed to start the session because headers have already been sent by "%s" at line %d.', $file, $line)); } if (!session_start()) { throw new \RuntimeException('Failed to start the session'); }
$this->registerBag($attributes); $flashes = $flashes ?: new FlashBag(); $this->flashName = $flashes->getName(); $this->registerBag($flashes); } public function start() { return $this->storage->start(); } public function has($name)
namespace Illuminate\Session; use Symfony\Component\HttpFoundation\Session\Session as SymfonySession; class Store extends SymfonySession { public function start() { parent::start(); if (!$this->has('_token')) { $this->put('_token', str_random(40));
$this->registerBootingEvent(); $this->registerCloseEvent(); } } protected function registerBootingEvent() { $this->app->booting(function ($app) { $app['session']->start(); }); }
public function booted($callback) { $this->bootedCallbacks[] = $callback; } protected function fireAppCallbacks(array $callbacks) { foreach ($callbacks as $callback) { call_user_func($callback, $this); } }
{ if ($this->booted) { return; } foreach ($this->serviceProviders as $provider) { $provider->boot(); } $this->fireAppCallbacks($this->bootingCallbacks); $this->booted = true; $this->fireAppCallbacks($this->bootedCallbacks);
| | Before we handle the requests we need to make sure the application has | been booted up. The boot process will call the "boot" method on all | service provider giving all a chance to register their overrides. | */ $app->boot(); /*
| separate location so we can isolate the creation of an application | from the actual running of the application with a given request. | */ $framework = $app['path.base'].'/vendor/laravel/framework/src'; require $framework.'/Illuminate/Foundation/start.php'; /*
| We need to illuminate PHP development, so let's turn on the lights. | This bootstraps the framework and gets it ready for use, then it | will load up this application so that we can run it and send | the responses back to the browser and delight these users. | */ $app = require_once __DIR__.'/../bootstrap/start.php'; /*
Key | Value |
USER | osaa |
HOME | /home/osaa |
FCGI_ROLE | RESPONDER |
REDIRECT_REDIRECT_UNIQUE_ID | Z9tzShd9SG3g2wbGA6FzFAAAAFo |
REDIRECT_REDIRECT_SCRIPT_URL | /teams/56912 |
REDIRECT_REDIRECT_SCRIPT_URI | https://www.osaa.org/teams/56912 |
REDIRECT_REDIRECT_HTTPS | on |
REDIRECT_REDIRECT_SSL_TLS_SNI | www.osaa.org |
REDIRECT_REDIRECT_STATUS | 200 |
REDIRECT_UNIQUE_ID | Z9tzShd9SG3g2wbGA6FzFAAAAFo |
REDIRECT_SCRIPT_URL | /teams/56912 |
REDIRECT_SCRIPT_URI | https://www.osaa.org/teams/56912 |
REDIRECT_HTTPS | on |
REDIRECT_SSL_TLS_SNI | www.osaa.org |
REDIRECT_STATUS | 200 |
UNIQUE_ID | Z9tzShd9SG3g2wbGA6FzFAAAAFo |
SCRIPT_URL | /teams/56912 |
SCRIPT_URI | https://www.osaa.org/teams/56912 |
HTTPS | on |
SSL_TLS_SNI | www.osaa.org |
proxy-nokeepalive | 1 |
HTTP_CF_RAY | 92318830b47deaf4-ORD |
HTTP_X_FORWARDED_FOR | 2a06:98c0:3600::103 |
HTTP_HOST | www.osaa.org |
HTTP_CF_WORKER | paperai.life |
HTTP_ACCEPT_ENCODING | gzip, br |
HTTP_ORIGIN | https://www.osaa.org |
HTTP_X_FORWARDED_PROTO | https |
HTTP_CF_CONNECTING_IP | 2a06:98c0:3600::103 |
HTTP_CF_VISITOR | {"scheme":"https"} |
HTTP_USER_AGENT | Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected]) |
HTTP_REFERER | https://www.osaa.org |
HTTP_COOKIE | cart_currency=USD; secure_customer_sig=; laravel_session=eyJpdiI6Ikk0bHAwNnc4eHd5SWtOaGt6RTBUR2c9PSIsInZhbHVlIjoiTHlSTDFwK3lYMHJoVnJpaTYwd0Y4ZXdDaUFYRTRLRktjdmE0MlNuZ1hwRENPN1Evc29iRktHTTZJODV5ZjVmWG5xd2pDSFZ3RStwRThMZTUybWw5b1c1ckpYQU1FdTBnRGozNkQvVjJYL1BzNndadi9LbnlONnNhL09aeURUTmUiLCJtYWMiOiJjNGFiY2U2ODk4ZjYzMGM0MjI2MzZlZWYyNTAwMWM0ZWRkZTdkMDlkMTlkZjc1ZDBiNDkxOGU1MDQzYWU4NWMyIn0%3D; XSRF-TOKEN=eyJpdiI6ImpHWlVWQTU2QW45dmtaNzNxanFNMXc9PSIsInZhbHVlIjoiZEYyeW4yTDI4R20wWDlnUU5WcE1zZjEzamFnU2Z2RlFJWS92azBaeFhpYUdlSHJERTFITE14eVdadEJmNi9uWGdmTE5mK2hITVlNMVdydzFXMkYxWFlncUo1R2R3Nm5xK1NWbnhVdlpieXo3VVNkZFlzN1RBWittZU84YUlVVWEiLCJtYWMiOiIyZTRlZTY0MzgxN2QzMjY5NGQ2NDVhMTE2ZWFlMmZiMjRlMzVlZmQ5YzVlZmMzMzQzYjEwOGZhNmRkMjI3MTRmIn0%3D |
HTTP_CF_IPCOUNTRY | US |
HTTP_ACCEPT | */* |
HTTP_CONNECTION | Keep-Alive |
HTTP_CF_EW_VIA | 15 |
HTTP_CDN_LOOP | cloudflare; loops=1; subreqs=1 |
HTTP_X_HTTPS | 1 |
PATH | /usr/local/jdk/bin:/usr/kerberos/sbin:/usr/kerberos/bin:/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/X11R6/bin:/usr/local/bin:/usr/X11R6/bin:/root/bin:/opt/bin |
SERVER_SIGNATURE | |
SERVER_SOFTWARE | Apache |
SERVER_NAME | www.osaa.org |
SERVER_ADDR | 69.42.56.39 |
SERVER_PORT | 443 |
REMOTE_ADDR | 172.71.254.162 |
DOCUMENT_ROOT | /home/osaa/public_html |
REQUEST_SCHEME | https |
CONTEXT_PREFIX | |
CONTEXT_DOCUMENT_ROOT | /home/osaa/public_html |
SERVER_ADMIN | [email protected] |
SCRIPT_FILENAME | /home/osaa/public_html/demo/index.php |
REMOTE_PORT | 48846 |
REDIRECT_URL | /demo/teams/56912 |
GATEWAY_INTERFACE | CGI/1.1 |
SERVER_PROTOCOL | HTTP/1.1 |
REQUEST_METHOD | GET |
QUERY_STRING | |
REQUEST_URI | /teams/56912 |
SCRIPT_NAME | /demo/index.php |
PHP_SELF | /demo/index.php |
REQUEST_TIME_FLOAT | 1742435146.4236 |
REQUEST_TIME | 1742435146 |
argv | Array ( ) |
argc | 0 |
Key | Value |
cart_currency | USD |
secure_customer_sig | |
laravel_session | eyJpdiI6Ikk0bHAwNnc4eHd5SWtOaGt6RTBUR2c9PSIsInZhbHVlIjoiTHlSTDFwK3lYMHJoVnJpaTYwd0Y4ZXdDaUFYRTRLRktjdmE0MlNuZ1hwRENPN1Evc29iRktHTTZJODV5ZjVmWG5xd2pDSFZ3RStwRThMZTUybWw5b1c1ckpYQU1FdTBnRGozNkQvVjJYL1BzNndadi9LbnlONnNhL09aeURUTmUiLCJtYWMiOiJjNGFiY2U2ODk4ZjYzMGM0MjI2MzZlZWYyNTAwMWM0ZWRkZTdkMDlkMTlkZjc1ZDBiNDkxOGU1MDQzYWU4NWMyIn0= |
XSRF-TOKEN | eyJpdiI6ImpHWlVWQTU2QW45dmtaNzNxanFNMXc9PSIsInZhbHVlIjoiZEYyeW4yTDI4R20wWDlnUU5WcE1zZjEzamFnU2Z2RlFJWS92azBaeFhpYUdlSHJERTFITE14eVdadEJmNi9uWGdmTE5mK2hITVlNMVdydzFXMkYxWFlncUo1R2R3Nm5xK1NWbnhVdlpieXo3VVNkZFlzN1RBWittZU84YUlVVWEiLCJtYWMiOiIyZTRlZTY0MzgxN2QzMjY5NGQ2NDVhMTE2ZWFlMmZiMjRlMzVlZmQ5YzVlZmMzMzQzYjEwOGZhNmRkMjI3MTRmIn0= |