sonarrradarrplexorganizrnginxdashboardhtpcserverhomepagesabnzbdheimdallembycouchpotatonzbgetbookmarkapplication-dashboardmuximuxlandingpagestartpagelanding
		
		
		
		
			You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							104 lines
						
					
					
						
							3.5 KiB
						
					
					
				
			
		
		
		
			
			
			
				
					
				
				
					
				
			
		
		
	
	
							104 lines
						
					
					
						
							3.5 KiB
						
					
					
				| <?php | |
| 
 | |
| /* | |
|  * This file is part of the Symfony package. | |
|  * | |
|  * (c) Fabien Potencier <fabien@symfony.com> | |
|  * | |
|  * For the full copyright and license information, please view the LICENSE | |
|  * file that was distributed with this source code. | |
|  */ | |
| 
 | |
| namespace Symfony\Component\HttpFoundation\Tests; | |
| 
 | |
| use PHPUnit\Framework\TestCase; | |
| use Symfony\Component\HttpFoundation\IpUtils; | |
| 
 | |
| class IpUtilsTest extends TestCase | |
| { | |
|     /** | |
|      * @dataProvider getIpv4Data | |
|      */ | |
|     public function testIpv4($matches, $remoteAddr, $cidr) | |
|     { | |
|         $this->assertSame($matches, IpUtils::checkIp($remoteAddr, $cidr)); | |
|     } | |
| 
 | |
|     public function getIpv4Data() | |
|     { | |
|         return [ | |
|             [true, '192.168.1.1', '192.168.1.1'], | |
|             [true, '192.168.1.1', '192.168.1.1/1'], | |
|             [true, '192.168.1.1', '192.168.1.0/24'], | |
|             [false, '192.168.1.1', '1.2.3.4/1'], | |
|             [false, '192.168.1.1', '192.168.1.1/33'], // invalid subnet | |
|             [true, '192.168.1.1', ['1.2.3.4/1', '192.168.1.0/24']], | |
|             [true, '192.168.1.1', ['192.168.1.0/24', '1.2.3.4/1']], | |
|             [false, '192.168.1.1', ['1.2.3.4/1', '4.3.2.1/1']], | |
|             [true, '1.2.3.4', '0.0.0.0/0'], | |
|             [true, '1.2.3.4', '192.168.1.0/0'], | |
|             [false, '1.2.3.4', '256.256.256/0'], // invalid CIDR notation | |
|             [false, 'an_invalid_ip', '192.168.1.0/24'], | |
|         ]; | |
|     } | |
| 
 | |
|     /** | |
|      * @dataProvider getIpv6Data | |
|      */ | |
|     public function testIpv6($matches, $remoteAddr, $cidr) | |
|     { | |
|         if (!\defined('AF_INET6')) { | |
|             $this->markTestSkipped('Only works when PHP is compiled without the option "disable-ipv6".'); | |
|         } | |
| 
 | |
|         $this->assertSame($matches, IpUtils::checkIp($remoteAddr, $cidr)); | |
|     } | |
| 
 | |
|     public function getIpv6Data() | |
|     { | |
|         return [ | |
|             [true, '2a01:198:603:0:396e:4789:8e99:890f', '2a01:198:603:0::/65'], | |
|             [false, '2a00:198:603:0:396e:4789:8e99:890f', '2a01:198:603:0::/65'], | |
|             [false, '2a01:198:603:0:396e:4789:8e99:890f', '::1'], | |
|             [true, '0:0:0:0:0:0:0:1', '::1'], | |
|             [false, '0:0:603:0:396e:4789:8e99:0001', '::1'], | |
|             [true, '0:0:603:0:396e:4789:8e99:0001', '::/0'], | |
|             [true, '0:0:603:0:396e:4789:8e99:0001', '2a01:198:603:0::/0'], | |
|             [true, '2a01:198:603:0:396e:4789:8e99:890f', ['::1', '2a01:198:603:0::/65']], | |
|             [true, '2a01:198:603:0:396e:4789:8e99:890f', ['2a01:198:603:0::/65', '::1']], | |
|             [false, '2a01:198:603:0:396e:4789:8e99:890f', ['::1', '1a01:198:603:0::/65']], | |
|             [false, '}__test|O:21:"JDatabaseDriverMysqli":3:{s:2', '::1'], | |
|             [false, '2a01:198:603:0:396e:4789:8e99:890f', 'unknown'], | |
|         ]; | |
|     } | |
| 
 | |
|     /** | |
|      * @expectedException \RuntimeException | |
|      * @requires extension sockets | |
|      */ | |
|     public function testAnIpv6WithOptionDisabledIpv6() | |
|     { | |
|         if (\defined('AF_INET6')) { | |
|             $this->markTestSkipped('Only works when PHP is compiled with the option "disable-ipv6".'); | |
|         } | |
| 
 | |
|         IpUtils::checkIp('2a01:198:603:0:396e:4789:8e99:890f', '2a01:198:603:0::/65'); | |
|     } | |
| 
 | |
|     /** | |
|      * @dataProvider invalidIpAddressData | |
|      */ | |
|     public function testInvalidIpAddressesDoNotMatch($requestIp, $proxyIp) | |
|     { | |
|         $this->assertFalse(IpUtils::checkIp4($requestIp, $proxyIp)); | |
|     } | |
| 
 | |
|     public function invalidIpAddressData() | |
|     { | |
|         return [ | |
|             'invalid proxy wildcard' => ['192.168.20.13', '*'], | |
|             'invalid proxy missing netmask' => ['192.168.20.13', '0.0.0.0'], | |
|             'invalid request IP with invalid proxy wildcard' => ['0.0.0.0', '*'], | |
|         ]; | |
|     } | |
| }
 | |
| 
 |