Initial Drupal 11 with DDEV setup
This commit is contained in:
		
							
								
								
									
										95
									
								
								vendor/symfony/validator/Constraints/IpValidator.php
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										95
									
								
								vendor/symfony/validator/Constraints/IpValidator.php
									
									
									
									
										vendored
									
									
										Normal file
									
								
							@ -0,0 +1,95 @@
 | 
			
		||||
<?php
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * This file is part of the Symfony package.
 | 
			
		||||
 *
 | 
			
		||||
 * (c) Fabien Potencier <fabien@symfony.com>
 | 
			
		||||
 *
 | 
			
		||||
 * For the full copyright and license information, please view the LICENSE
 | 
			
		||||
 * file that was distributed with this source code.
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
namespace Symfony\Component\Validator\Constraints;
 | 
			
		||||
 | 
			
		||||
use Symfony\Component\Validator\Constraint;
 | 
			
		||||
use Symfony\Component\Validator\ConstraintValidator;
 | 
			
		||||
use Symfony\Component\Validator\Exception\UnexpectedTypeException;
 | 
			
		||||
use Symfony\Component\Validator\Exception\UnexpectedValueException;
 | 
			
		||||
 | 
			
		||||
/**
 | 
			
		||||
 * Validates whether a value is a valid IP address.
 | 
			
		||||
 *
 | 
			
		||||
 * @author Bernhard Schussek <bschussek@gmail.com>
 | 
			
		||||
 * @author Joseph Bielawski <stloyd@gmail.com>
 | 
			
		||||
 * @author Ninos Ego <me@ninosego.de>
 | 
			
		||||
 */
 | 
			
		||||
class IpValidator extends ConstraintValidator
 | 
			
		||||
{
 | 
			
		||||
    /**
 | 
			
		||||
     * Checks whether an IP address is valid.
 | 
			
		||||
     *
 | 
			
		||||
     * @internal
 | 
			
		||||
     */
 | 
			
		||||
    public static function checkIp(string $ip, mixed $version): bool
 | 
			
		||||
    {
 | 
			
		||||
        $flag = match ($version) {
 | 
			
		||||
            Ip::V4, Ip::V4_NO_PUBLIC, Ip::V4_ONLY_PRIVATE, Ip::V4_ONLY_RESERVED => \FILTER_FLAG_IPV4,
 | 
			
		||||
            Ip::V6, Ip::V6_NO_PUBLIC, Ip::V6_ONLY_PRIVATE, Ip::V6_ONLY_RESERVED => \FILTER_FLAG_IPV6,
 | 
			
		||||
            Ip::V4_NO_PRIVATE => \FILTER_FLAG_IPV4 | \FILTER_FLAG_NO_PRIV_RANGE,
 | 
			
		||||
            Ip::V6_NO_PRIVATE => \FILTER_FLAG_IPV6 | \FILTER_FLAG_NO_PRIV_RANGE,
 | 
			
		||||
            Ip::ALL_NO_PRIVATE => \FILTER_FLAG_NO_PRIV_RANGE,
 | 
			
		||||
            Ip::V4_NO_RESERVED => \FILTER_FLAG_IPV4 | \FILTER_FLAG_NO_RES_RANGE,
 | 
			
		||||
            Ip::V6_NO_RESERVED => \FILTER_FLAG_IPV6 | \FILTER_FLAG_NO_RES_RANGE,
 | 
			
		||||
            Ip::ALL_NO_RESERVED => \FILTER_FLAG_NO_RES_RANGE,
 | 
			
		||||
            Ip::V4_ONLY_PUBLIC => \FILTER_FLAG_IPV4 | \FILTER_FLAG_NO_PRIV_RANGE | \FILTER_FLAG_NO_RES_RANGE,
 | 
			
		||||
            Ip::V6_ONLY_PUBLIC => \FILTER_FLAG_IPV6 | \FILTER_FLAG_NO_PRIV_RANGE | \FILTER_FLAG_NO_RES_RANGE,
 | 
			
		||||
            Ip::ALL_ONLY_PUBLIC => \FILTER_FLAG_NO_PRIV_RANGE | \FILTER_FLAG_NO_RES_RANGE,
 | 
			
		||||
            default => 0,
 | 
			
		||||
        };
 | 
			
		||||
 | 
			
		||||
        if (!filter_var($ip, \FILTER_VALIDATE_IP, $flag)) {
 | 
			
		||||
            return false;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        $inverseFlag = match ($version) {
 | 
			
		||||
            Ip::V4_NO_PUBLIC, Ip::V6_NO_PUBLIC, Ip::ALL_NO_PUBLIC => \FILTER_FLAG_NO_PRIV_RANGE | \FILTER_FLAG_NO_RES_RANGE,
 | 
			
		||||
            Ip::V4_ONLY_PRIVATE, Ip::V6_ONLY_PRIVATE, Ip::ALL_ONLY_PRIVATE => \FILTER_FLAG_NO_PRIV_RANGE,
 | 
			
		||||
            Ip::V4_ONLY_RESERVED, Ip::V6_ONLY_RESERVED, Ip::ALL_ONLY_RESERVED => \FILTER_FLAG_NO_RES_RANGE,
 | 
			
		||||
            default => 0,
 | 
			
		||||
        };
 | 
			
		||||
 | 
			
		||||
        if ($inverseFlag && filter_var($ip, \FILTER_VALIDATE_IP, $inverseFlag)) {
 | 
			
		||||
            return false;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        return true;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    public function validate(mixed $value, Constraint $constraint): void
 | 
			
		||||
    {
 | 
			
		||||
        if (!$constraint instanceof Ip) {
 | 
			
		||||
            throw new UnexpectedTypeException($constraint, Ip::class);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (null === $value || '' === $value) {
 | 
			
		||||
            return;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (!\is_scalar($value) && !$value instanceof \Stringable) {
 | 
			
		||||
            throw new UnexpectedValueException($value, 'string');
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        $value = (string) $value;
 | 
			
		||||
 | 
			
		||||
        if (null !== $constraint->normalizer) {
 | 
			
		||||
            $value = ($constraint->normalizer)($value);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (!self::checkIp($value, $constraint->version)) {
 | 
			
		||||
            $this->context->buildViolation($constraint->message)
 | 
			
		||||
                ->setParameter('{{ value }}', $this->formatValue($value))
 | 
			
		||||
                ->setCode(Ip::INVALID_IP_ERROR)
 | 
			
		||||
                ->addViolation();
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
		Reference in New Issue
	
	Block a user