Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commitc9c33b5

Browse files
author
Henry Snoek
committed
remove link-local IPv6 address (fe80::1)
1 parent032b167 commitc9c33b5

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

‎cookbook/configuration/environments.rst‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -328,7 +328,7 @@ The new environment is now accessible via::
328328
aren't accessible, the front controller is usually protected from external
329329
IP addresses via the following code at the top of the controller::
330330

331-
if (!in_array(@$_SERVER['REMOTE_ADDR'], array('127.0.0.1', 'fe80::1', '::1'))) {
331+
if (!in_array(@$_SERVER['REMOTE_ADDR'], array('127.0.0.1', '::1'))) {
332332
die('You are not allowed to access this file. Check '.basename(__FILE__).' for more information.');
333333
}
334334

‎cookbook/security/access_control.rst‎

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ pattern so that it is only accessible by requests from the local server itself:
176176
# ...
177177
access_control:
178178
#
179-
-{ path: ^/internal, roles: IS_AUTHENTICATED_ANONYMOUSLY, ips: [127.0.0.1,fe80::1,::1] }
179+
-{ path: ^/internal, roles: IS_AUTHENTICATED_ANONYMOUSLY, ips: [127.0.0.1, ::1] }
180180
-{ path: ^/internal, roles: ROLE_NO_ACCESS }
181181
182182
..code-block::xml
@@ -193,7 +193,7 @@ pattern so that it is only accessible by requests from the local server itself:
193193
<!-- ...-->
194194
<rulepath="^/internal"
195195
role="IS_AUTHENTICATED_ANONYMOUSLY"
196-
ips="127.0.0.1,fe80::1,::1"
196+
ips="127.0.0.1, ::1"
197197
/>
198198
199199
<rulepath="^/internal"role="ROLE_NO_ACCESS" />
@@ -209,7 +209,7 @@ pattern so that it is only accessible by requests from the local server itself:
209209
array(
210210
'path' => '^/internal',
211211
'role' => 'IS_AUTHENTICATED_ANONYMOUSLY',
212-
'ips' => '127.0.0.1,fe80::1,::1'
212+
'ips' => '127.0.0.1, ::1'
213213
),
214214
array(
215215
'path' => '^/internal',
@@ -230,8 +230,8 @@ the external IP address ``10.0.0.1``:
230230
that does not match an existing role, it just serves as a trick to always
231231
deny access).
232232

233-
But if the same request comes from ``127.0.0.1``, ``::1`` (the IPv6 loopback
234-
address) or ``fe80::1`` (the IPv6 link-local address):
233+
But if the same request comes from ``127.0.0.1`` or ``::1`` (the IPv6 loopback
234+
address):
235235

236236
* Now, the first access control rule is enabled as both the ``path`` and the
237237
``ip`` match: access is allowed as the user always has the

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp