Skip to content

Commit 0ea3491

Browse files
committed
[#5784] add missing fe80::1
1 parent 68830ef commit 0ea3491

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

cookbook/configuration/environments.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -328,7 +328,7 @@ The new environment is now accessible via::
328328
aren't accessible, the front controller is usually protected from external
329329
IP addresses via the following code at the top of the controller::
330330

331-
if (!in_array(@$_SERVER['REMOTE_ADDR'], array('127.0.0.1', '::1'))) {
331+
if (!in_array(@$_SERVER['REMOTE_ADDR'], array('127.0.0.1', 'fe80::1', '::1'))) {
332332
die('You are not allowed to access this file. Check '.basename(__FILE__).' for more information.');
333333
}
334334

cookbook/security/access_control.rst

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,7 @@ pattern so that it is only accessible by requests from the local server itself:
193193
<!-- ... -->
194194
<rule path="^/internal"
195195
role="IS_AUTHENTICATED_ANONYMOUSLY"
196-
ips="127.0.0.1, ::1"
196+
ips="127.0.0.1, fe80::1, ::1"
197197
/>
198198
199199
<rule path="^/internal" role="ROLE_NO_ACCESS" />
@@ -209,7 +209,7 @@ pattern so that it is only accessible by requests from the local server itself:
209209
array(
210210
'path' => '^/internal',
211211
'role' => 'IS_AUTHENTICATED_ANONYMOUSLY',
212-
'ips' => '127.0.0.1, ::1'
212+
'ips' => '127.0.0.1, fe80::1, ::1'
213213
),
214214
array(
215215
'path' => '^/internal',
@@ -230,8 +230,8 @@ the external IP address ``10.0.0.1``:
230230
that does not match an existing role, it just serves as a trick to always
231231
deny access).
232232

233-
But if the same request comes from ``127.0.0.1`` or ``::1`` (the IPv6 loopback
234-
address):
233+
But if the same request comes from ``127.0.0.1``, ``::1`` (the IPv6 loopback
234+
address) or ``fe80::1`` (the IPv6 link-local address):
235235

236236
* Now, the first access control rule is enabled as both the ``path`` and the
237237
``ip`` match: access is allowed as the user always has the

0 commit comments

Comments
 (0)