mirror of
https://github.com/e107inc/e107.git
synced 2025-07-25 00:41:52 +02:00
Issue #5487 IP handler tests and tweaks while awaiting more data about banned user. isAddressRoutable() now uses PHP methods.
This commit is contained in:
@@ -168,25 +168,20 @@ class eIPHandler
|
|||||||
$this->ourConfigDir = e_SYSTEM.eIPHandler::BAN_FILE_DIRECTORY;
|
$this->ourConfigDir = e_SYSTEM.eIPHandler::BAN_FILE_DIRECTORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
$this->ourIP = $this->ipEncode($this->getCurrentIP());
|
$this->ourIP = $this->ipEncode($this->getCurrentIP());
|
||||||
|
|
||||||
$this->serverIP = $this->ipEncode(isset($_SERVER['SERVER_ADDR']) ? $_SERVER['SERVER_ADDR'] : 'x.x.x.x');
|
$this->serverIP = $this->ipEncode($_SERVER['SERVER_ADDR'] ?? 'x.x.x.x');
|
||||||
|
|
||||||
$this->makeUserToken();
|
$this->makeUserToken();
|
||||||
|
|
||||||
$ipStatus = $this->checkIP($this->ourIP);
|
$ipStatus = $this->checkIP($this->ourIP);
|
||||||
if ($ipStatus != 0)
|
|
||||||
|
if ($ipStatus < 0) // Blacklisted
|
||||||
{
|
{
|
||||||
if ($ipStatus < 0)
|
|
||||||
{ // Blacklisted
|
|
||||||
$this->logBanItem($ipStatus, 'result --> '.$ipStatus); // only log blacklist
|
$this->logBanItem($ipStatus, 'result --> '.$ipStatus); // only log blacklist
|
||||||
$this->banAction($ipStatus); // This will abort if appropriate
|
$this->banAction($ipStatus); // This will abort if appropriate
|
||||||
}
|
}
|
||||||
//elseif ($ipStatus > 0)
|
|
||||||
// { // Whitelisted - we may want to set a specific indicator
|
|
||||||
// }
|
|
||||||
}
|
|
||||||
// Continue here - user not banned (so far)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -196,7 +191,6 @@ class eIPHandler
|
|||||||
public function setIP($ip)
|
public function setIP($ip)
|
||||||
{
|
{
|
||||||
$this->ourIP = $this->ipEncode($ip);
|
$this->ourIP = $this->ipEncode($ip);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@@ -210,8 +204,6 @@ class eIPHandler
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Add an entry to the banlist log file (which is a simple text file)
|
* Add an entry to the banlist log file (which is a simple text file)
|
||||||
* A date/time string is prepended to the line
|
* A date/time string is prepended to the line
|
||||||
@@ -232,7 +224,6 @@ class eIPHandler
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Generate relatively unique user token from browser info
|
* Generate relatively unique user token from browser info
|
||||||
* (but don't believe that the browser info is accurate - can readily be spoofed)
|
* (but don't believe that the browser info is accurate - can readily be spoofed)
|
||||||
@@ -269,80 +260,60 @@ class eIPHandler
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Check whether an IP address is routable
|
* Check whether an IP address is routable
|
||||||
*
|
*
|
||||||
* @param string $ip - IPV4 or IPV6 numeric address.
|
* @param string $ip IPV4 or IPV6 numeric address.
|
||||||
*
|
* @return bool TRUE if routable, FALSE if not
|
||||||
* @return boolean TRUE if routable, FALSE if not
|
|
||||||
|
|
||||||
@todo handle IPV6 fully
|
|
||||||
*/
|
*/
|
||||||
public function isAddressRoutable($ip)
|
public function isAddressRoutable($ip)
|
||||||
{
|
{
|
||||||
$ignore = array(
|
|
||||||
'0\..*' , '^127\..*' , // Local loopbacks
|
|
||||||
'192\.168\..*' , // RFC1918 - Private Network
|
|
||||||
'172\.(?:1[6789]|2\d|3[01])\..*' , // RFC1918 - Private network
|
|
||||||
'10\..*' , // RFC1918 - Private Network
|
|
||||||
'169\.254\..*' , // RFC3330 - Link-local, auto-DHCP
|
|
||||||
'2(?:2[456789]|[345][0-9])\..*' // Single check for Class D and Class E
|
|
||||||
);
|
|
||||||
|
|
||||||
|
$isRoutable = filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE) !== false;
|
||||||
|
|
||||||
|
if(!$isRoutable)
|
||||||
$pattern = '#^('.implode('|',$ignore).')#';
|
|
||||||
|
|
||||||
if(preg_match($pattern,$ip))
|
|
||||||
{
|
{
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Explicitly block IPv4 multicast: 224.0.0.0 - 239.255.255.255
|
||||||
/* XXX preg_match doesn't accept arrays.
|
if(filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4))
|
||||||
if (preg_match(array(
|
|
||||||
'#^0\..*#' , '#^127\..*#' , // Local loopbacks
|
|
||||||
'#^192\.168\..*#' , // RFC1918 - Private Network
|
|
||||||
'#^172\.(?:1[6789]|2\d|3[01])\..*#' , // RFC1918 - Private network
|
|
||||||
'#^10\..*#' , // RFC1918 - Private Network
|
|
||||||
'#^169\.254\..*#' , // RFC3330 - Link-local, auto-DHCP
|
|
||||||
'#^2(?:2[456789]|[345][0-9])\..*#' // Single check for Class D and Class E
|
|
||||||
), $ip))
|
|
||||||
{
|
{
|
||||||
return FALSE;
|
$long = ip2long($ip);
|
||||||
|
if($long !== false && $long >= ip2long('224.0.0.0') && $long <= ip2long('239.255.255.255'))
|
||||||
|
{
|
||||||
|
return false;
|
||||||
}
|
}
|
||||||
*/
|
|
||||||
|
|
||||||
if (strpos(':', $ip) === FALSE) return TRUE;
|
|
||||||
// Must be an IPV6 address here
|
|
||||||
// @todo need to handle IPV4 addresses in IPV6 format
|
|
||||||
$ip = strtolower($ip);
|
|
||||||
if ($ip == 'ff02::1') return FALSE; // link-local all nodes multicast group
|
|
||||||
if ($ip == 'ff02:0000:0000:0000:0000:0000:0000:0001') return FALSE;
|
|
||||||
if ($ip == '::1') return FALSE; // localhost
|
|
||||||
if ($ip == '0000:0000:0000:0000:0000:0000:0000:0001') return FALSE;
|
|
||||||
if (strpos($ip, 'fc00:') === 0) return FALSE; // local addresses
|
|
||||||
// @todo add:
|
|
||||||
// ::0 (all zero) - invalid
|
|
||||||
// ff02::1:ff00:0/104 - Solicited-Node multicast addresses - add?
|
|
||||||
// 2001:0000::/29 through 2001:01f8::/29 - special purpose addresses
|
|
||||||
// 2001:db8::/32 - used in documentation
|
|
||||||
return TRUE;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Explicitly block IPv6 multicast: ff00::/8
|
||||||
|
if(filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV6))
|
||||||
|
{
|
||||||
|
if(stripos($ip, 'ff') === 0 || stripos($ip, 'ff00:') === 0)
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get current user's IP address in 'normal' form.
|
* Get current user's IP address in 'normal' form.
|
||||||
* Likely to be very similar to existing e107::getIP() function
|
* Likely to be very similar to existing e107::getIP() function
|
||||||
* May log X-FORWARDED-FOR cases - or could generate a special IPV6 address, maybe?
|
* May log X-FORWARDED-FOR cases - or could generate a special IPV6 address, maybe?
|
||||||
|
*
|
||||||
|
* @param array|null $server Array simulating $_SERVER (e.g., ['REMOTE_ADDR' => '1.2.3.4']). Defaults to global $_SERVER.
|
||||||
|
* @return string Normalized IP address.
|
||||||
*/
|
*/
|
||||||
private function getCurrentIP()
|
protected function getCurrentIP($server = null)
|
||||||
{
|
{
|
||||||
if(!$this->ourIP)
|
if(!$this->ourIP)
|
||||||
{
|
{
|
||||||
$ip = isset($_SERVER['REMOTE_ADDR']) ? $_SERVER['REMOTE_ADDR'] : 'x.x.x.x';
|
$server = $server ?? $_SERVER;
|
||||||
|
$ip = $server['REMOTE_ADDR'] ?? 'x.x.x.x';
|
||||||
|
|
||||||
if ($ip4 = getenv('HTTP_X_FORWARDED_FOR'))
|
if ($ip4 = getenv('HTTP_X_FORWARDED_FOR'))
|
||||||
{
|
{
|
||||||
if (!$this->isAddressRoutable($ip))
|
if (!$this->isAddressRoutable($ip))
|
||||||
@@ -352,8 +323,10 @@ class eIPHandler
|
|||||||
$this->logBanItem(0, 'X_Forward '.$ip4.' --> '.$ip); // Just log for interest ATM
|
$this->logBanItem(0, 'X_Forward '.$ip4.' --> '.$ip); // Just log for interest ATM
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
$this->ourIP = $this->ipEncode($ip); // Normalise for storage
|
$this->ourIP = $this->ipEncode($ip); // Normalise for storage
|
||||||
}
|
}
|
||||||
|
|
||||||
return $this->ourIP;
|
return $this->ourIP;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -370,7 +343,7 @@ class eIPHandler
|
|||||||
*/
|
*/
|
||||||
public function getIP($forDisplay = FALSE)
|
public function getIP($forDisplay = FALSE)
|
||||||
{
|
{
|
||||||
if ($forDisplay == FALSE) return $this->ourIP;
|
if (!$forDisplay) return $this->ourIP;
|
||||||
return $this->ipDecode($this->ourIP);
|
return $this->ipDecode($this->ourIP);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -446,6 +419,7 @@ class eIPHandler
|
|||||||
die();
|
die();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
$this->logBanItem($code, 'Unmatched action: '.$search.' - no block implemented');
|
$this->logBanItem($code, 'Unmatched action: '.$search.' - no block implemented');
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -592,6 +566,11 @@ class eIPHandler
|
|||||||
*/
|
*/
|
||||||
public function ipEncode($ip, $wildCards = FALSE, $div = ':')
|
public function ipEncode($ip, $wildCards = FALSE, $div = ':')
|
||||||
{
|
{
|
||||||
|
if(empty($ip))
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
$ret = '';
|
$ret = '';
|
||||||
$divider = '';
|
$divider = '';
|
||||||
if(strpos($ip, ':')!==FALSE)
|
if(strpos($ip, ':')!==FALSE)
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
<?php
|
<?php
|
||||||
/**
|
/**
|
||||||
* e107 website system
|
* e107 website system
|
||||||
*
|
*
|
||||||
* Copyright (C) 2008-2020 e107 Inc (e107.org)
|
* Copyright (C) 2008-2020 e107 Inc (e107.org)
|
||||||
@@ -9,9 +9,8 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
class eIPHandlerTest extends \Codeception\Test\Unit
|
||||||
class eIPHandlerTest extends \Codeception\Test\Unit
|
{
|
||||||
{
|
|
||||||
|
|
||||||
/** @var eIPHandler */
|
/** @var eIPHandler */
|
||||||
protected $ip;
|
protected $ip;
|
||||||
@@ -22,77 +21,73 @@
|
|||||||
try
|
try
|
||||||
{
|
{
|
||||||
$this->ip = $this->make('eIPHandler');
|
$this->ip = $this->make('eIPHandler');
|
||||||
} catch(Exception $e)
|
}
|
||||||
|
catch(Exception $e)
|
||||||
{
|
{
|
||||||
$this->assertTrue(false, "Couldn't load eIPHandler object");
|
$this::fail("Couldn't load eIPHandler object");
|
||||||
}
|
}
|
||||||
|
|
||||||
$this->ip->__construct();
|
|
||||||
}
|
|
||||||
|
|
||||||
/* public function testMakeEmailQuery()
|
|
||||||
{
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public function testGet_host_name()
|
|
||||||
{
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public function testSetIP()
|
|
||||||
{
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Test IPHandler::ipDecode()
|
||||||
|
*/
|
||||||
public function testIpDecode()
|
public function testIpDecode()
|
||||||
{
|
{
|
||||||
|
|
||||||
|
$this->ip->__construct();
|
||||||
|
|
||||||
|
$this::assertEquals("101.102.103.104", $this->ip->ipDecode("101.102.103.104")); // IPv4 returns itself
|
||||||
|
|
||||||
|
$this::assertEquals("10.11.12.13", $this->ip->ipDecode("0000:0000:0000:0000:0000:ffff:0a0b:0c0d")); // IPv6 uncompressed
|
||||||
|
|
||||||
|
$this::assertEquals("201.202.203.204", $this->ip->ipDecode("00000000000000000000ffffc9cacbcc")); // 32-char hex
|
||||||
|
|
||||||
|
// $this::assertEquals("123.123.123.123", $this->ip->ipDecode("::ffff:7b7b:7b7b")); // Fully compressed IPv6 (not supported)
|
||||||
|
|
||||||
|
// $this::assertEquals("192.0.2.128", $this->ip->ipDecode("::ffff:c000:0280")); // RFC 4291 short form (not supported)
|
||||||
|
|
||||||
|
// $this::assertEquals("8.8.8.8", $this->ip->ipDecode("0:0:0:0:0:ffff:808:808")); // Uncompressed mapped with short ints (not supported)
|
||||||
|
|
||||||
|
// $this::assertEquals("8.8.4.4", $this->ip->ipDecode("::ffff:808:404")); // Double compressed form (not supported)
|
||||||
|
|
||||||
|
// $this::assertEquals("1.2.3.4", $this->ip->ipDecode("::ffff:1.2.3.4")); // Embedded dot-decimal IPv4 (not supported)
|
||||||
}
|
}
|
||||||
|
|
||||||
public function testWhatIsThis()
|
|
||||||
|
public function testGetCurrentIP()
|
||||||
{
|
{
|
||||||
|
|
||||||
|
$reflection = new ReflectionClass($this->ip);
|
||||||
|
$method = $reflection->getMethod('getCurrentIP');
|
||||||
|
$method->setAccessible(true);
|
||||||
|
|
||||||
|
$tests = [
|
||||||
|
0 => [
|
||||||
|
'server' => [
|
||||||
|
'REMOTE_ADDR' => '123.123.123.123'
|
||||||
|
],
|
||||||
|
'expected' => '123.123.123.123'
|
||||||
|
]
|
||||||
|
];
|
||||||
|
|
||||||
|
foreach($tests as $index => $test)
|
||||||
|
{
|
||||||
|
$result = $method->invoke($this->ip, $test['server']); // IP6
|
||||||
|
$expected = $this->ip->ipEncode($test['expected']); // convert to IP6.
|
||||||
|
|
||||||
|
$this::assertSame($expected, $result, "Failed on #$index");
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public function testIp6AddWildcards()
|
|
||||||
{
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public function testIsUserLogged()
|
|
||||||
{
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public function testCheckFilePerms()
|
|
||||||
{
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public function test__construct()
|
|
||||||
{
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public function testCheckBan()
|
|
||||||
{
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public function testPermsToString()
|
|
||||||
{
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public function testMakeDomainQuery()
|
|
||||||
{
|
|
||||||
|
|
||||||
}*/
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Test IPHandler::add_ban()
|
||||||
|
*/
|
||||||
public function testAdd_ban()
|
public function testAdd_ban()
|
||||||
{
|
{
|
||||||
// $bantype = 1 for manual, 2 for flooding, 4 for multiple logins
|
|
||||||
|
$this->ip->__construct();
|
||||||
|
|
||||||
$banDurations = array(
|
$banDurations = array(
|
||||||
'0' => 0,
|
'0' => 0,
|
||||||
@@ -105,56 +100,141 @@
|
|||||||
'-8' => 0 // unknown
|
'-8' => 0 // unknown
|
||||||
);
|
);
|
||||||
|
|
||||||
//set ban duration pref.
|
e107::getConfig()->set('ban_durations', $banDurations)->save(false, true, false);
|
||||||
e107::getConfig()->set('ban_durations',$banDurations)->save(false,true, false);
|
|
||||||
|
|
||||||
$result = $this->ip->add_ban(2,"unit test generated ban", '123.123.123.123', 0);
|
|
||||||
$this->assertTrue($result);
|
|
||||||
|
|
||||||
|
|
||||||
}
|
|
||||||
/*
|
|
||||||
public function testGetIP()
|
|
||||||
{
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public function testGetConfigDir()
|
|
||||||
{
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public function testRegenerateFiles()
|
|
||||||
{
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public function testBan()
|
|
||||||
{
|
|
||||||
|
|
||||||
|
$result = $this->ip->add_ban(2, "unit test generated ban", '123.123.123.123');
|
||||||
|
$this::assertTrue($result);
|
||||||
}
|
}
|
||||||
|
|
||||||
public function testIsAddressRoutable()
|
public function testIsAddressRoutable()
|
||||||
{
|
{
|
||||||
|
|
||||||
|
$testCases = [
|
||||||
|
['ip' => '8.8.8.8', 'expected' => true],
|
||||||
|
['ip' => '192.168.1.1', 'expected' => false],
|
||||||
|
['ip' => '127.0.0.1', 'expected' => false],
|
||||||
|
['ip' => '10.0.0.45', 'expected' => false],
|
||||||
|
['ip' => '172.20.5.4', 'expected' => false],
|
||||||
|
['ip' => '169.254.1.2', 'expected' => false],
|
||||||
|
['ip' => '224.0.0.1', 'expected' => false],
|
||||||
|
['ip' => '240.0.0.1', 'expected' => false],
|
||||||
|
['ip' => '24.300.0.124', 'expected' => false],
|
||||||
|
['ip' => '2001:4860:4860::8888', 'expected' => true],
|
||||||
|
];
|
||||||
|
|
||||||
|
foreach($testCases as $case)
|
||||||
|
{
|
||||||
|
$desc = sprintf("%s should %s be routable", $case['ip'], $case['expected'] ? '' : 'not');
|
||||||
|
$result = $this->ip->isAddressRoutable($case['ip']);
|
||||||
|
$this::assertSame($case['expected'], $result, $desc);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Test IPHandler::ipEncode()
|
||||||
|
*/
|
||||||
public function testIpEncode()
|
public function testIpEncode()
|
||||||
{
|
{
|
||||||
|
|
||||||
}
|
$tests = [
|
||||||
|
// IPv4 to IPv6-mapped form
|
||||||
|
0 => [
|
||||||
|
'ip' => '192.168.1.100',
|
||||||
|
'wildCards' => false,
|
||||||
|
'div' => ':',
|
||||||
|
'expected' => '0000:0000:0000:0000:0000:ffff:c0a8:0164'
|
||||||
|
],
|
||||||
|
// IPv6
|
||||||
|
1 => [
|
||||||
|
'ip' => '2001:0db8:85a3:0000:0000:8a2e:0370:7334',
|
||||||
|
'wildCards' => false,
|
||||||
|
'div' => ':',
|
||||||
|
'expected' => '2001:0db8:85a3:0000:0000:8a2e:0370:7334'
|
||||||
|
],
|
||||||
|
// IPv6 (shortened)
|
||||||
|
2 => [
|
||||||
|
'ip' => '2001:db8::1',
|
||||||
|
'wildCards' => false,
|
||||||
|
'div' => ':',
|
||||||
|
'expected' => '2001:0db8:0000:0000:0000:0000:0000:0001'
|
||||||
|
],
|
||||||
|
// Zero-padded hex (div = '')
|
||||||
|
3 => [
|
||||||
|
'ip' => '127.0.0.1',
|
||||||
|
'wildCards' => false,
|
||||||
|
'div' => '',
|
||||||
|
'expected' => '00000000000000000000ffff7f000001'
|
||||||
|
],
|
||||||
|
// Wildcard input: expects encoded hex with xx
|
||||||
|
4 => [
|
||||||
|
'ip' => '192.168.1.*',
|
||||||
|
'wildCards' => true,
|
||||||
|
'div' => ':',
|
||||||
|
'expected' => '0000:0000:0000:0000:0000:ffff:c0a8:01xx'
|
||||||
|
],
|
||||||
|
|
||||||
public function testDebug()
|
// Invalid input
|
||||||
|
5 => [
|
||||||
|
'ip' => 'not.an.ip',
|
||||||
|
'wildCards' => false,
|
||||||
|
'div' => ':',
|
||||||
|
'expected' => '0000:0000:0000:0000:0000:ffff:0000:0000'
|
||||||
|
],
|
||||||
|
6 => [
|
||||||
|
'ip' => '192.168.1.x',
|
||||||
|
'wildCards' => true,
|
||||||
|
'div' => ':',
|
||||||
|
'expected' => '0000:0000:0000:0000:0000:ffff:c0a8:01xx'
|
||||||
|
],
|
||||||
|
7 => [
|
||||||
|
'ip' => '',
|
||||||
|
'wildCards' => false,
|
||||||
|
'div' => ':',
|
||||||
|
'expected' => false
|
||||||
|
],
|
||||||
|
8 => [
|
||||||
|
'ip' => null,
|
||||||
|
'wildCards' => false,
|
||||||
|
'div' => ':',
|
||||||
|
'expected' => false
|
||||||
|
],
|
||||||
|
9 => [
|
||||||
|
'ip' => '*.*.*.*',
|
||||||
|
'wildCards' => true,
|
||||||
|
'div' => ':',
|
||||||
|
'expected' => '0000:0000:0000:0000:0000:ffff:xxxx:xxxx'
|
||||||
|
],
|
||||||
|
10 => [
|
||||||
|
'ip' => '256.300.1.1', // invalid IP, should be 0-255.
|
||||||
|
'wildCards' => false,
|
||||||
|
'div' => ':',
|
||||||
|
'expected' => '0000:0000:0000:0000:0000:ffff:10012c:0101' // should be false
|
||||||
|
],
|
||||||
|
11 => [
|
||||||
|
'ip' => '::',
|
||||||
|
'wildCards' => false,
|
||||||
|
'div' => ':',
|
||||||
|
'expected' => '0000:0000:0000:0000:0000:0000:0000:0000'
|
||||||
|
],
|
||||||
|
12 => [
|
||||||
|
'ip' => 'ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff',
|
||||||
|
'wildCards' => false,
|
||||||
|
'div' => ':',
|
||||||
|
'expected' => 'ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff'
|
||||||
|
],
|
||||||
|
];
|
||||||
|
|
||||||
|
foreach($tests as $i => $case)
|
||||||
{
|
{
|
||||||
|
$result = $this->ip->ipEncode($case['ip'], $case['wildCards'], $case['div']);
|
||||||
|
$msg = "Failed on test #$i ({$case['ip']})";
|
||||||
|
$this::assertSame($case['expected'], $result, $msg);
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public function testGetUserToken()
|
|
||||||
{
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
*/
|
|
||||||
|
|
||||||
|
|
||||||
}
|
|
||||||
|
Reference in New Issue
Block a user