@@ -47,6 +47,8 @@ public function testRenderWithObjectsAsAttributes()
47
47
$ subRequest ->attributes ->replace (array ('object ' => $ object , '_format ' => 'html ' , '_controller ' => 'main_controller ' , '_locale ' => 'en ' ));
48
48
$ subRequest ->headers ->set ('x-forwarded-for ' , array ('127.0.0.1 ' ));
49
49
$ subRequest ->headers ->set ('forwarded ' , array ('for="127.0.0.1";host="localhost";proto=http ' ));
50
+ $ subRequest ->server ->set ('HTTP_X_FORWARDED_FOR ' , '127.0.0.1 ' );
51
+ $ subRequest ->server ->set ('HTTP_FORWARDED ' , 'for="127.0.0.1";host="localhost";proto=http ' );
50
52
51
53
$ strategy = new InlineFragmentRenderer ($ this ->getKernelExpectingRequest ($ subRequest ));
52
54
@@ -101,6 +103,7 @@ public function testRenderWithTrustedHeaderDisabled()
101
103
102
104
$ expectedSubRequest = Request::create ('/ ' );
103
105
$ expectedSubRequest ->headers ->set ('x-forwarded-for ' , array ('127.0.0.1 ' ));
106
+ $ expectedSubRequest ->server ->set ('HTTP_X_FORWARDED_FOR ' , '127.0.0.1 ' );
104
107
105
108
$ strategy = new InlineFragmentRenderer ($ this ->getKernelExpectingRequest ($ expectedSubRequest ));
106
109
$ this ->assertSame ('foo ' , $ strategy ->render ('/ ' , Request::create ('/ ' ))->getContent ());
@@ -193,8 +196,10 @@ public function testESIHeaderIsKeptInSubrequest()
193
196
194
197
if (Request::HEADER_X_FORWARDED_FOR & Request::getTrustedHeaderSet ()) {
195
198
$ expectedSubRequest ->headers ->set ('x-forwarded-for ' , array ('127.0.0.1 ' ));
199
+ $ expectedSubRequest ->server ->set ('HTTP_X_FORWARDED_FOR ' , '127.0.0.1 ' );
196
200
}
197
201
$ expectedSubRequest ->headers ->set ('forwarded ' , array ('for="127.0.0.1";host="localhost";proto=http ' ));
202
+ $ expectedSubRequest ->server ->set ('HTTP_FORWARDED ' , 'for="127.0.0.1";host="localhost";proto=http ' );
198
203
199
204
$ strategy = new InlineFragmentRenderer ($ this ->getKernelExpectingRequest ($ expectedSubRequest ));
200
205
@@ -217,6 +222,8 @@ public function testHeadersPossiblyResultingIn304AreNotAssignedToSubrequest()
217
222
$ expectedSubRequest = Request::create ('/ ' );
218
223
$ expectedSubRequest ->headers ->set ('x-forwarded-for ' , array ('127.0.0.1 ' ));
219
224
$ expectedSubRequest ->headers ->set ('forwarded ' , array ('for="127.0.0.1";host="localhost";proto=http ' ));
225
+ $ expectedSubRequest ->server ->set ('HTTP_X_FORWARDED_FOR ' , '127.0.0.1 ' );
226
+ $ expectedSubRequest ->server ->set ('HTTP_FORWARDED ' , 'for="127.0.0.1";host="localhost";proto=http ' );
220
227
221
228
$ strategy = new InlineFragmentRenderer ($ this ->getKernelExpectingRequest ($ expectedSubRequest ));
222
229
$ request = Request::create ('/ ' , 'GET ' , array (), array (), array (), array ('HTTP_IF_MODIFIED_SINCE ' => 'Fri, 01 Jan 2016 00:00:00 GMT ' , 'HTTP_IF_NONE_MATCH ' => '* ' ));
@@ -232,6 +239,8 @@ public function testFirstTrustedProxyIsSetAsRemote()
232
239
$ expectedSubRequest ->server ->set ('REMOTE_ADDR ' , '127.0.0.1 ' );
233
240
$ expectedSubRequest ->headers ->set ('x-forwarded-for ' , array ('127.0.0.1 ' ));
234
241
$ expectedSubRequest ->headers ->set ('forwarded ' , array ('for="127.0.0.1";host="localhost";proto=http ' ));
242
+ $ expectedSubRequest ->server ->set ('HTTP_X_FORWARDED_FOR ' , '127.0.0.1 ' );
243
+ $ expectedSubRequest ->server ->set ('HTTP_FORWARDED ' , 'for="127.0.0.1";host="localhost";proto=http ' );
235
244
236
245
$ strategy = new InlineFragmentRenderer ($ this ->getKernelExpectingRequest ($ expectedSubRequest ));
237
246
@@ -249,6 +258,8 @@ public function testIpAddressOfRangedTrustedProxyIsSetAsRemote()
249
258
$ expectedSubRequest ->server ->set ('REMOTE_ADDR ' , '127.0.0.1 ' );
250
259
$ expectedSubRequest ->headers ->set ('x-forwarded-for ' , array ('127.0.0.1 ' ));
251
260
$ expectedSubRequest ->headers ->set ('forwarded ' , array ('for="127.0.0.1";host="localhost";proto=http ' ));
261
+ $ expectedSubRequest ->server ->set ('HTTP_X_FORWARDED_FOR ' , '127.0.0.1 ' );
262
+ $ expectedSubRequest ->server ->set ('HTTP_FORWARDED ' , 'for="127.0.0.1";host="localhost";proto=http ' );
252
263
253
264
Request::setTrustedProxies (array ('1.1.1.1/24 ' ), -1 );
254
265
0 commit comments