SharedInboxController
Request
GET Parameters
None
POST Parameters
None
Uploaded Files
None
Request Attributes
Key | Value |
---|---|
_controller | "App\Controller\ActivityPub\SharedInboxController" |
_firewall_context | "security.firewall.map.context.main" |
_route | "ap_shared_inbox" |
_route_params | [] |
_security_firewall_run | "_security_main" |
_stopwatch_token | "549bdc" |
Request Headers
Header | Value |
---|---|
accept | "*/*" |
accept-encoding | "gzip" |
content-length | "5023" |
content-type | "application/activity+json" |
date | "Sun, 30 Mar 2025 15:11:30 GMT" |
digest | "SHA-256=JkM0jZ+rKLl4mRMQALO8UdTP2sELtml1QL7dH+scYxg=" |
host | "kbin.spritesserver.nl" |
signature | "keyId="https://lemmy.ca/c/nostupidquestions#main-key",algorithm="hs2019",headers="(request-target) content-type date digest host",signature="TI3J1dH2uW3evXBMO0m5aDgPD4w64wJf6gACdZQwefDEAxdMvaGY00yoHDm9n21XkMmqlU2zRfIK2wWfLVhWXHqkKMggLcX5t/gJp7B5FtjAsLFdxzLgZcoGy0VOAB/19Tsf/XusPzSf5ieXbni6Pdvm+mSAUZXH+JTbwQdfLmgCCeU+pM8ONW5stfM/bIGH60UmKj04YTxnLYKLAK7bcBpavZcTIf5A56/bGC4I0ikDiQqDZ6lcb8R7anBg2Y38kQHwlVL799SNkLkLAKP1s+pY55PotQ25YtVD5btTNs9ExzO1DHFoSq9Oeyj6xbQ+iE6rOQ2wGGtqhNSOElnHhQ=="" |
user-agent | "Lemmy/0.19.10; +https://lemmy.ca" |
x-php-ob-level | "1" |
Request Content
Pretty
{ "@context": [ "https:\/\/join-lemmy.org\/context.json", "https:\/\/www.w3.org\/ns\/activitystreams" ], "actor": "https:\/\/lemmy.ca\/c\/nostupidquestions", "to": [ "https:\/\/www.w3.org\/ns\/activitystreams#Public" ], "object": { "id": "https:\/\/lemmy.wtf\/activities\/update\/c28729f1-55dc-47ac-8249-e41c194de38e", "actor": "https:\/\/lemmy.wtf\/u\/Joeyowlhouse", "@context": [ "https:\/\/join-lemmy.org\/context.json", "https:\/\/www.w3.org\/ns\/activitystreams" ], "to": [ "https:\/\/www.w3.org\/ns\/activitystreams#Public" ], "object": { "type": "Page", "id": "https:\/\/lemmy.wtf\/post\/18842191", "attributedTo": "https:\/\/lemmy.wtf\/u\/Joeyowlhouse", "to": [ "https:\/\/lemmy.ca\/c\/nostupidquestions", "https:\/\/www.w3.org\/ns\/activitystreams#Public" ], "name": "Is this considered concern-trolling?", "cc": [], "content": "<p>Let\u2019s say there\u2019s a troll who has been banned from many different websites. This troll has participated in many malicious actions (including Nazi apologia) and is known to impersonate the people who called them out by stealing their exact aliases to sign up on other sites, with dozens of examples of this.<\/p>\n<p>Troll sends themself anonymous asks to their Tumblr \u201cdrama\u201d blog to feign engagement, with the \u201canonymous asker\u201d (Troll) pretending to be a concerned person, saying \u201cI personally know [Insert random person who just happens to have the same username as someone who exposed Troll] and I am very sad to see [Insert person who exposed Troll] is impersonating my friend, [Insert random person who just happens to have the same username as someone who exposed Troll]\u201d.<\/p>\n<p>When Troll links to the \u201cimpersonated\u201d person\u2019s account, the random person is always a blank account with no activity and is not even following Troll\u2019s account. There\u2019s no evidence that Troll is or was friends with the linked person. What Troll is doing is searching for blank accounts, some are over a decade old, that just coincidentally happen to have the same username as one of their exposers, as a type of \u201cha, see, you impersonate people too you hypocrite, your credibility is bust\u201d gotcha. Which completely ignores the context that Troll only steals the aliases of people who exposed them, a very consistent pattern and nothing at all like two people coincidentally sharing the same username.<\/p>\n<p>Would what Troll is doing be considered a form of concern-trolling? Or is this another type of manipulation\/trolling that I\u2019m not aware of? Troll often spams links to their blog as a way of trying to manipulate people unaware of their history into believing Troll is a \u201ctargeted individual\u201d.<\/p>\n", "mediaType": "text\/html", "source": { "content": "Let's say there's a troll who has been banned from many different websites. This troll has participated in many malicious actions (including Nazi apologia) and is known to impersonate the people who called them out by stealing their exact aliases to sign up on other sites, with dozens of examples of this. \n\nTroll sends themself anonymous asks to their Tumblr \"drama\" blog to feign engagement, with the \"anonymous asker\" (Troll) pretending to be a concerned person, saying \"I personally know [Insert random person who just happens to have the same username as someone who exposed Troll] and I am very sad to see [Insert person who exposed Troll] is impersonating my friend, [Insert random person who just happens to have the same username as someone who exposed Troll]\". \n\nWhen Troll links to the \"impersonated\" person's account, the random person is always a blank account with no activity and is not even following Troll's account. There's no evidence that Troll is or was friends with the linked person. What Troll is doing is searching for blank accounts, some are over a decade old, that just coincidentally happen to have the same username as one of their exposers, as a type of \"ha, see, you impersonate people too you hypocrite, your credibility is bust\" gotcha. Which completely ignores the context that Troll only steals the aliases of people who exposed them, a very consistent pattern and nothing at all like two people coincidentally sharing the same username.\n\nWould what Troll is doing be considered a form of concern-trolling? Or is this another type of manipulation\/trolling that I'm not aware of? Troll often spams links to their blog as a way of trying to manipulate people unaware of their history into believing Troll is a \"targeted individual\". ", "mediaType": "text\/markdown" }, "attachment": [], "sensitive": false, "published": "2025-03-30T14:57:23.984977Z", "updated": "2025-03-30T15:11:13.104869Z", "language": { "identifier": "en", "name": "English" }, "audience": "https:\/\/lemmy.ca\/c\/nostupidquestions", "tag": [ { "href": "https:\/\/lemmy.wtf\/post\/18842191", "name": "#nostupidquestions", "type": "Hashtag" } ] }, "cc": [ "https:\/\/lemmy.ca\/c\/nostupidquestions" ], "type": "Update", "audience": "https:\/\/lemmy.ca\/c\/nostupidquestions" }, "cc": [ "https:\/\/lemmy.ca\/c\/nostupidquestions\/followers" ], "type": "Announce", "id": "https:\/\/lemmy.ca\/activities\/announce\/update\/00e889b6-225c-4b8d-8350-b3b46045113e" }
Raw
{"@context":["https://join-lemmy.org/context.json","https://www.w3.org/ns/activitystreams"],"actor":"https://lemmy.ca/c/nostupidquestions","to":["https://www.w3.org/ns/activitystreams#Public"],"object":{"id":"https://lemmy.wtf/activities/update/c28729f1-55dc-47ac-8249-e41c194de38e","actor":"https://lemmy.wtf/u/Joeyowlhouse","@context":["https://join-lemmy.org/context.json","https://www.w3.org/ns/activitystreams"],"to":["https://www.w3.org/ns/activitystreams#Public"],"object":{"type":"Page","id":"https://lemmy.wtf/post/18842191","attributedTo":"https://lemmy.wtf/u/Joeyowlhouse","to":["https://lemmy.ca/c/nostupidquestions","https://www.w3.org/ns/activitystreams#Public"],"name":"Is this considered concern-trolling?","cc":[],"content":"<p>Let’s say there’s a troll who has been banned from many different websites. This troll has participated in many malicious actions (including Nazi apologia) and is known to impersonate the people who called them out by stealing their exact aliases to sign up on other sites, with dozens of examples of this.</p>\n<p>Troll sends themself anonymous asks to their Tumblr “drama” blog to feign engagement, with the “anonymous asker” (Troll) pretending to be a concerned person, saying “I personally know [Insert random person who just happens to have the same username as someone who exposed Troll] and I am very sad to see [Insert person who exposed Troll] is impersonating my friend, [Insert random person who just happens to have the same username as someone who exposed Troll]”.</p>\n<p>When Troll links to the “impersonated” person’s account, the random person is always a blank account with no activity and is not even following Troll’s account. There’s no evidence that Troll is or was friends with the linked person. What Troll is doing is searching for blank accounts, some are over a decade old, that just coincidentally happen to have the same username as one of their exposers, as a type of “ha, see, you impersonate people too you hypocrite, your credibility is bust” gotcha. Which completely ignores the context that Troll only steals the aliases of people who exposed them, a very consistent pattern and nothing at all like two people coincidentally sharing the same username.</p>\n<p>Would what Troll is doing be considered a form of concern-trolling? Or is this another type of manipulation/trolling that I’m not aware of? Troll often spams links to their blog as a way of trying to manipulate people unaware of their history into believing Troll is a “targeted individual”.</p>\n","mediaType":"text/html","source":{"content":"Let's say there's a troll who has been banned from many different websites. This troll has participated in many malicious actions (including Nazi apologia) and is known to impersonate the people who called them out by stealing their exact aliases to sign up on other sites, with dozens of examples of this. \n\nTroll sends themself anonymous asks to their Tumblr \"drama\" blog to feign engagement, with the \"anonymous asker\" (Troll) pretending to be a concerned person, saying \"I personally know [Insert random person who just happens to have the same username as someone who exposed Troll] and I am very sad to see [Insert person who exposed Troll] is impersonating my friend, [Insert random person who just happens to have the same username as someone who exposed Troll]\". \n\nWhen Troll links to the \"impersonated\" person's account, the random person is always a blank account with no activity and is not even following Troll's account. There's no evidence that Troll is or was friends with the linked person. What Troll is doing is searching for blank accounts, some are over a decade old, that just coincidentally happen to have the same username as one of their exposers, as a type of \"ha, see, you impersonate people too you hypocrite, your credibility is bust\" gotcha. Which completely ignores the context that Troll only steals the aliases of people who exposed them, a very consistent pattern and nothing at all like two people coincidentally sharing the same username.\n\nWould what Troll is doing be considered a form of concern-trolling? Or is this another type of manipulation/trolling that I'm not aware of? Troll often spams links to their blog as a way of trying to manipulate people unaware of their history into believing Troll is a \"targeted individual\". ","mediaType":"text/markdown"},"attachment":[],"sensitive":false,"published":"2025-03-30T14:57:23.984977Z","updated":"2025-03-30T15:11:13.104869Z","language":{"identifier":"en","name":"English"},"audience":"https://lemmy.ca/c/nostupidquestions","tag":[{"href":"https://lemmy.wtf/post/18842191","name":"#nostupidquestions","type":"Hashtag"}]},"cc":["https://lemmy.ca/c/nostupidquestions"],"type":"Update","audience":"https://lemmy.ca/c/nostupidquestions"},"cc":["https://lemmy.ca/c/nostupidquestions/followers"],"type":"Announce","id":"https://lemmy.ca/activities/announce/update/00e889b6-225c-4b8d-8350-b3b46045113e"}
Response
Response Headers
Header | Value |
---|---|
cache-control | "no-cache, private" |
content-type | "application/activity+json" |
date | "Sun, 30 Mar 2025 15:11:31 GMT" |
x-debug-token | "60e219" |
Cookies
Request Cookies
No request cookies
Response Cookies
No response cookies
Session 1
Session Metadata
No session metadata
Session Attributes
No session attributes
Session Usage
1
Usages
Stateless check enabled
Usage |
---|
Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage:41
[ [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-core/Authentication/Token/Storage/UsageTrackingTokenStorage.php" "line" => 41 "function" => "getMetadataBag" "class" => "Symfony\Component\HttpFoundation\Session\Session" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Authenticator/RememberMeAuthenticator.php" "line" => 69 "function" => "getToken" "class" => "Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Authentication/AuthenticatorManager.php" "line" => 111 "function" => "supports" "class" => "Symfony\Component\Security\Http\Authenticator\RememberMeAuthenticator" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Firewall/AuthenticatorManagerListener.php" "line" => 34 "function" => "supports" "class" => "Symfony\Component\Security\Http\Authentication\AuthenticatorManager" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Authenticator/Debug/TraceableAuthenticatorManagerListener.php" "line" => 40 "function" => "supports" "class" => "Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-bundle/Debug/WrappedLazyListener.php" "line" => 38 "function" => "supports" "class" => "Symfony\Component\Security\Http\Authenticator\Debug\TraceableAuthenticatorManagerListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Firewall/AbstractListener.php" "line" => 25 "function" => "supports" "class" => "Symfony\Bundle\SecurityBundle\Debug\WrappedLazyListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-bundle/Security/LazyFirewallContext.php" "line" => 60 "function" => "__invoke" "class" => "Symfony\Component\Security\Http\Firewall\AbstractListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-bundle/Debug/TraceableFirewallListener.php" "line" => 80 "function" => "__invoke" "class" => "Symfony\Bundle\SecurityBundle\Security\LazyFirewallContext" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Firewall.php" "line" => 95 "function" => "callListeners" "class" => "Symfony\Bundle\SecurityBundle\Debug\TraceableFirewallListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/Debug/WrappedListener.php" "line" => 116 "function" => "onKernelRequest" "class" => "Symfony\Component\Security\Http\Firewall" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/EventDispatcher.php" "line" => 220 "function" => "__invoke" "class" => "Symfony\Component\EventDispatcher\Debug\WrappedListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/EventDispatcher.php" "line" => 56 "function" => "callListeners" "class" => "Symfony\Component\EventDispatcher\EventDispatcher" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/Debug/TraceableEventDispatcher.php" "line" => 139 "function" => "dispatch" "class" => "Symfony\Component\EventDispatcher\EventDispatcher" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/http-kernel/HttpKernel.php" "line" => 157 "function" => "dispatch" "class" => "Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/http-kernel/HttpKernel.php" "line" => 76 "function" => "handleRaw" "class" => "Symfony\Component\HttpKernel\HttpKernel" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/http-kernel/Kernel.php" "line" => 197 "function" => "handle" "class" => "Symfony\Component\HttpKernel\HttpKernel" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/runtime/Runner/Symfony/HttpKernelRunner.php" "line" => 35 "function" => "handle" "class" => "Symfony\Component\HttpKernel\Kernel" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/autoload_runtime.php" "line" => 29 "function" => "run" "class" => "Symfony\Component\Runtime\Runner\Symfony\HttpKernelRunner" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/public/index.php" "line" => 7 "args" => [ "/var/www/kbin/kbin/vendor/autoload_runtime.php" ] "function" => "require_once" ] ] |
Flashes
Flashes
No flash messages were created.
Server Parameters
Server Parameters
Defined in .env
Key | Value |
---|---|
APP_ENV | "dev" |
APP_SECRET | "82ce1339a6c267e28d1f1dcb37a7454c" |
CORS_ALLOW_ORIGIN | "^https?://(kbin.localhost|127\.0\.0\.1)(:[0-9]+)?$" |
DATABASE_URL | "postgresql://kbin:917eaa3d703f19d123@127.0.0.1:5433/kbin?serverVersion=15&charset=utf8" |
HCAPTCHA_SECRET | "" |
HCAPTCHA_SITE_KEY | "" |
JWT_PASSPHRASE | "" |
JWT_PUBLIC_KEY | "%kernel.project_dir%/config/jwt/public.pem" |
JWT_SECRET_KEY | "%kernel.project_dir%/config/jwt/private.pem" |
KBIN_ADMIN_ONLY_OAUTH_CLIENTS | "false" |
KBIN_API_ITEMS_PER_PAGE | "25" |
KBIN_CAPTCHA_ENABLED | "false" |
KBIN_CONTACT_EMAIL | "kbin@j0h.nl" |
KBIN_DEFAULT_LANG | "en" |
KBIN_DOMAIN | "kbin.spritesserver.nl" |
KBIN_FEDERATION_ENABLED | "true" |
KBIN_FEDERATION_PAGE_ENABLED | "true" |
KBIN_HEADER_LOGO | "false" |
KBIN_JS_ENABLED | "true" |
KBIN_META_DESCRIPTION | "a private kbin install" |
KBIN_META_KEYWORDS | "kbin, content agregator, open source, fediverse" |
KBIN_META_TITLE | "Sprites kbin instance" |
KBIN_REGISTRATIONS_ENABLED | "true" |
KBIN_SENDER_EMAIL | "kbin@j0h.nl" |
KBIN_STORAGE_URL | "https://kbin.spritesserver.nl/media/" |
KBIN_TITLE | "/kbin" |
LOCK_DSN | "flock" |
MAILER_DSN | "smtp://spritesmods.com" |
MERCURE_JWT_SECRET | "231e9a1277f5585d52aa0b1e34c0f984xxxx" |
MERCURE_PUBLIC_URL | "https://kbin.spritesserver.nl/.well-known/mercure" |
MERCURE_URL | "http://localhost:3000/.well-known/mercure" |
MESSENGER_TRANSPORT_DSN | "doctrine://default" |
OAUTH_FACEBOOK_ID | "" |
OAUTH_FACEBOOK_SECRET | "" |
OAUTH_GITHUB_ID | "" |
OAUTH_GITHUB_SECRET | "" |
OAUTH_GOOGLE_ID | "" |
OAUTH_GOOGLE_SECRET | "" |
POSTGRES_DB | "kbin" |
POSTGRES_PASSWORD | "917eaa3d703f19d123" |
POSTGRES_USER | "kbin" |
POSTGRES_VERSION | "15" |
REDIS_DNS | "redis://uSJBDOQfuOMgt8kyGhpUzViTnQSEdEJTsOIsYSsg3v40v@localhost" |
REDIS_PASSWORD | "uSJBDOQfuOMgt8kyGhpUzViTnQSEdEJTsOIsYSsg3v40v" |
S3_BUCKET | "media.karab.in" |
S3_KEY | "" |
S3_REGION | "eu-central-1" |
S3_SECRET | "" |
S3_VERSION | "latest" |
Defined as regular env variables
Key | Value |
---|---|
APP_DEBUG | "1" |
CONTENT_LENGTH | "5023" |
CONTENT_TYPE | "application/activity+json" |
CONTEXT_DOCUMENT_ROOT | "/var/www/kbin/kbin/public" |
CONTEXT_PREFIX | "" |
DOCUMENT_ROOT | "/var/www/kbin/kbin/public" |
GATEWAY_INTERFACE | "CGI/1.1" |
HTTPS | "on" |
HTTP_ACCEPT | "*/*" |
HTTP_ACCEPT_ENCODING | "gzip" |
HTTP_DATE | "Sun, 30 Mar 2025 15:11:30 GMT" |
HTTP_DIGEST | "SHA-256=JkM0jZ+rKLl4mRMQALO8UdTP2sELtml1QL7dH+scYxg=" |
HTTP_HOST | "kbin.spritesserver.nl" |
HTTP_SIGNATURE | "keyId="https://lemmy.ca/c/nostupidquestions#main-key",algorithm="hs2019",headers="(request-target) content-type date digest host",signature="TI3J1dH2uW3evXBMO0m5aDgPD4w64wJf6gACdZQwefDEAxdMvaGY00yoHDm9n21XkMmqlU2zRfIK2wWfLVhWXHqkKMggLcX5t/gJp7B5FtjAsLFdxzLgZcoGy0VOAB/19Tsf/XusPzSf5ieXbni6Pdvm+mSAUZXH+JTbwQdfLmgCCeU+pM8ONW5stfM/bIGH60UmKj04YTxnLYKLAK7bcBpavZcTIf5A56/bGC4I0ikDiQqDZ6lcb8R7anBg2Y38kQHwlVL799SNkLkLAKP1s+pY55PotQ25YtVD5btTNs9ExzO1DHFoSq9Oeyj6xbQ+iE6rOQ2wGGtqhNSOElnHhQ=="" |
HTTP_USER_AGENT | "Lemmy/0.19.10; +https://lemmy.ca" |
PATH | "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" |
PHP_SELF | "/index.php" |
QUERY_STRING | "" |
REDIRECT_HTTPS | "on" |
REDIRECT_SSL_CIPHER | "TLS_AES_256_GCM_SHA384" |
REDIRECT_SSL_CIPHER_ALGKEYSIZE | "256" |
REDIRECT_SSL_CIPHER_EXPORT | "false" |
REDIRECT_SSL_CIPHER_USEKEYSIZE | "256" |
REDIRECT_SSL_CLIENT_VERIFY | "NONE" |
REDIRECT_SSL_COMPRESS_METHOD | "NULL" |
REDIRECT_SSL_PROTOCOL | "TLSv1.3" |
REDIRECT_SSL_SECURE_RENEG | "true" |
REDIRECT_SSL_SERVER_A_KEY | "rsaEncryption" |
REDIRECT_SSL_SERVER_A_SIG | "sha256WithRSAEncryption" |
REDIRECT_SSL_SERVER_I_DN | "CN=R10,O=Let's Encrypt,C=US" |
REDIRECT_SSL_SERVER_I_DN_C | "US" |
REDIRECT_SSL_SERVER_I_DN_CN | "R10" |
REDIRECT_SSL_SERVER_I_DN_O | "Let's Encrypt" |
REDIRECT_SSL_SERVER_M_SERIAL | "03CA8906A34CBB589B1AC0F28C1A38434090" |
REDIRECT_SSL_SERVER_M_VERSION | "3" |
REDIRECT_SSL_SERVER_SAN_DNS_0 | "kbin.spritesserver.nl" |
REDIRECT_SSL_SERVER_S_DN | "CN=kbin.spritesserver.nl" |
REDIRECT_SSL_SERVER_S_DN_CN | "kbin.spritesserver.nl" |
REDIRECT_SSL_SERVER_V_END | "Apr 29 22:01:51 2025 GMT" |
REDIRECT_SSL_SERVER_V_START | "Jan 29 22:01:52 2025 GMT" |
REDIRECT_SSL_SESSION_ID | "c3531cb3af49e180366d9b35b678fb0035733ffeff6a821db7cfd123934b80ee" |
REDIRECT_SSL_SESSION_RESUMED | "Initial" |
REDIRECT_SSL_TLS_SNI | "kbin.spritesserver.nl" |
REDIRECT_SSL_VERSION_INTERFACE | "mod_ssl/2.4.62" |
REDIRECT_SSL_VERSION_LIBRARY | "OpenSSL/3.0.15" |
REDIRECT_STATUS | "200" |
REDIRECT_URL | "/f/inbox" |
REMOTE_ADDR | "199.167.16.56" |
REMOTE_PORT | "24453" |
REQUEST_METHOD | "POST" |
REQUEST_SCHEME | "https" |
REQUEST_TIME | 1743347491 |
REQUEST_TIME_FLOAT | 1743347491.1853 |
REQUEST_URI | "/f/inbox" |
SCRIPT_FILENAME | "/var/www/kbin/kbin/public/index.php" |
SCRIPT_NAME | "/index.php" |
SERVER_ADDR | "5.9.62.165" |
SERVER_ADMIN | "webmaster@spritesmods.com" |
SERVER_NAME | "kbin.spritesserver.nl" |
SERVER_PORT | "443" |
SERVER_PROTOCOL | "HTTP/1.1" |
SERVER_SIGNATURE | "" |
SERVER_SOFTWARE | "Apache" |
SSL_CIPHER | "TLS_AES_256_GCM_SHA384" |
SSL_CIPHER_ALGKEYSIZE | "256" |
SSL_CIPHER_EXPORT | "false" |
SSL_CIPHER_USEKEYSIZE | "256" |
SSL_CLIENT_VERIFY | "NONE" |
SSL_COMPRESS_METHOD | "NULL" |
SSL_PROTOCOL | "TLSv1.3" |
SSL_SECURE_RENEG | "true" |
SSL_SERVER_A_KEY | "rsaEncryption" |
SSL_SERVER_A_SIG | "sha256WithRSAEncryption" |
SSL_SERVER_I_DN | "CN=R10,O=Let's Encrypt,C=US" |
SSL_SERVER_I_DN_C | "US" |
SSL_SERVER_I_DN_CN | "R10" |
SSL_SERVER_I_DN_O | "Let's Encrypt" |
SSL_SERVER_M_SERIAL | "03CA8906A34CBB589B1AC0F28C1A38434090" |
SSL_SERVER_M_VERSION | "3" |
SSL_SERVER_SAN_DNS_0 | "kbin.spritesserver.nl" |
SSL_SERVER_S_DN | "CN=kbin.spritesserver.nl" |
SSL_SERVER_S_DN_CN | "kbin.spritesserver.nl" |
SSL_SERVER_V_END | "Apr 29 22:01:51 2025 GMT" |
SSL_SERVER_V_START | "Jan 29 22:01:52 2025 GMT" |
SSL_SESSION_ID | "c3531cb3af49e180366d9b35b678fb0035733ffeff6a821db7cfd123934b80ee" |
SSL_SESSION_RESUMED | "Initial" |
SSL_TLS_SNI | "kbin.spritesserver.nl" |
SSL_VERSION_INTERFACE | "mod_ssl/2.4.62" |
SSL_VERSION_LIBRARY | "OpenSSL/3.0.15" |
SYMFONY_DOTENV_VARS | "KBIN_DOMAIN,KBIN_TITLE,KBIN_DEFAULT_LANG,KBIN_FEDERATION_ENABLED,KBIN_CONTACT_EMAIL,KBIN_SENDER_EMAIL,KBIN_JS_ENABLED,KBIN_REGISTRATIONS_ENABLED,KBIN_API_ITEMS_PER_PAGE,KBIN_STORAGE_URL,KBIN_META_TITLE,KBIN_META_DESCRIPTION,KBIN_META_KEYWORDS,KBIN_HEADER_LOGO,KBIN_CAPTCHA_ENABLED,KBIN_FEDERATION_PAGE_ENABLED,REDIS_PASSWORD,REDIS_DNS,S3_KEY,S3_SECRET,S3_BUCKET,S3_REGION,S3_VERSION,OAUTH_FACEBOOK_ID,OAUTH_FACEBOOK_SECRET,OAUTH_GOOGLE_ID,OAUTH_GOOGLE_SECRET,OAUTH_GITHUB_ID,OAUTH_GITHUB_SECRET,KBIN_ADMIN_ONLY_OAUTH_CLIENTS,APP_ENV,APP_SECRET,POSTGRES_DB,POSTGRES_USER,POSTGRES_PASSWORD,POSTGRES_VERSION,DATABASE_URL,MESSENGER_TRANSPORT_DSN,MAILER_DSN,MERCURE_URL,MERCURE_PUBLIC_URL,MERCURE_JWT_SECRET,CORS_ALLOW_ORIGIN,LOCK_DSN,JWT_SECRET_KEY,JWT_PUBLIC_KEY,JWT_PASSPHRASE,HCAPTCHA_SITE_KEY,HCAPTCHA_SECRET" |