Skip to content

Commit 72b47e1

Browse files
committed
minor #6345 Remove link-local IPv6 address (snoek09)
This PR was merged into the 2.3 branch. Discussion ---------- Remove link-local IPv6 address | Q | A | ------------- | --- | Doc fix? | yes | New docs? | no | Applies to | all | Fixed tickets | #6310 Commits ------- c9c33b5 remove link-local IPv6 address (fe80::1)
2 parents c2ef745 + c9c33b5 commit 72b47e1

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

cookbook/configuration/environments.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -328,7 +328,7 @@ The new environment is now accessible via::
328328
aren't accessible, the front controller is usually protected from external
329329
IP addresses via the following code at the top of the controller::
330330

331-
if (!in_array(@$_SERVER['REMOTE_ADDR'], array('127.0.0.1', 'fe80::1', '::1'))) {
331+
if (!in_array(@$_SERVER['REMOTE_ADDR'], array('127.0.0.1', '::1'))) {
332332
die('You are not allowed to access this file. Check '.basename(__FILE__).' for more information.');
333333
}
334334

cookbook/security/access_control.rst

+5-5
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ pattern so that it is only accessible by requests from the local server itself:
176176
# ...
177177
access_control:
178178
#
179-
- { path: ^/internal, roles: IS_AUTHENTICATED_ANONYMOUSLY, ips: [127.0.0.1, fe80::1, ::1] }
179+
- { path: ^/internal, roles: IS_AUTHENTICATED_ANONYMOUSLY, ips: [127.0.0.1, ::1] }
180180
- { path: ^/internal, roles: ROLE_NO_ACCESS }
181181
182182
.. code-block:: xml
@@ -193,7 +193,7 @@ pattern so that it is only accessible by requests from the local server itself:
193193
<!-- ... -->
194194
<rule path="^/internal"
195195
role="IS_AUTHENTICATED_ANONYMOUSLY"
196-
ips="127.0.0.1, fe80::1, ::1"
196+
ips="127.0.0.1, ::1"
197197
/>
198198
199199
<rule path="^/internal" role="ROLE_NO_ACCESS" />
@@ -209,7 +209,7 @@ pattern so that it is only accessible by requests from the local server itself:
209209
array(
210210
'path' => '^/internal',
211211
'role' => 'IS_AUTHENTICATED_ANONYMOUSLY',
212-
'ips' => '127.0.0.1, fe80::1, ::1'
212+
'ips' => '127.0.0.1, ::1'
213213
),
214214
array(
215215
'path' => '^/internal',
@@ -230,8 +230,8 @@ the external IP address ``10.0.0.1``:
230230
that does not match an existing role, it just serves as a trick to always
231231
deny access).
232232

233-
But if the same request comes from ``127.0.0.1``, ``::1`` (the IPv6 loopback
234-
address) or ``fe80::1`` (the IPv6 link-local address):
233+
But if the same request comes from ``127.0.0.1`` or ``::1`` (the IPv6 loopback
234+
address):
235235

236236
* Now, the first access control rule is enabled as both the ``path`` and the
237237
``ip`` match: access is allowed as the user always has the

0 commit comments

Comments
 (0)