annotate vendor/symfony/validator/Constraints/IpValidator.php @ 19:fa3358dc1485 tip

Add ndrum files
author Chris Cannam
date Wed, 28 Aug 2019 13:14:47 +0100
parents 129ea1e6d783
children
rev   line source
Chris@0 1 <?php
Chris@0 2
Chris@0 3 /*
Chris@0 4 * This file is part of the Symfony package.
Chris@0 5 *
Chris@0 6 * (c) Fabien Potencier <fabien@symfony.com>
Chris@0 7 *
Chris@0 8 * For the full copyright and license information, please view the LICENSE
Chris@0 9 * file that was distributed with this source code.
Chris@0 10 */
Chris@0 11
Chris@0 12 namespace Symfony\Component\Validator\Constraints;
Chris@0 13
Chris@0 14 use Symfony\Component\Validator\Constraint;
Chris@0 15 use Symfony\Component\Validator\ConstraintValidator;
Chris@0 16 use Symfony\Component\Validator\Exception\UnexpectedTypeException;
Chris@0 17
Chris@0 18 /**
Chris@0 19 * Validates whether a value is a valid IP address.
Chris@0 20 *
Chris@0 21 * @author Bernhard Schussek <bschussek@gmail.com>
Chris@0 22 * @author Joseph Bielawski <stloyd@gmail.com>
Chris@0 23 */
Chris@0 24 class IpValidator extends ConstraintValidator
Chris@0 25 {
Chris@0 26 /**
Chris@0 27 * {@inheritdoc}
Chris@0 28 */
Chris@0 29 public function validate($value, Constraint $constraint)
Chris@0 30 {
Chris@0 31 if (!$constraint instanceof Ip) {
Chris@0 32 throw new UnexpectedTypeException($constraint, __NAMESPACE__.'\Ip');
Chris@0 33 }
Chris@0 34
Chris@0 35 if (null === $value || '' === $value) {
Chris@0 36 return;
Chris@0 37 }
Chris@0 38
Chris@17 39 if (!is_scalar($value) && !(\is_object($value) && method_exists($value, '__toString'))) {
Chris@0 40 throw new UnexpectedTypeException($value, 'string');
Chris@0 41 }
Chris@0 42
Chris@0 43 $value = (string) $value;
Chris@0 44
Chris@0 45 switch ($constraint->version) {
Chris@0 46 case Ip::V4:
Chris@0 47 $flag = FILTER_FLAG_IPV4;
Chris@0 48 break;
Chris@0 49
Chris@0 50 case Ip::V6:
Chris@0 51 $flag = FILTER_FLAG_IPV6;
Chris@0 52 break;
Chris@0 53
Chris@0 54 case Ip::V4_NO_PRIV:
Chris@0 55 $flag = FILTER_FLAG_IPV4 | FILTER_FLAG_NO_PRIV_RANGE;
Chris@0 56 break;
Chris@0 57
Chris@0 58 case Ip::V6_NO_PRIV:
Chris@0 59 $flag = FILTER_FLAG_IPV6 | FILTER_FLAG_NO_PRIV_RANGE;
Chris@0 60 break;
Chris@0 61
Chris@0 62 case Ip::ALL_NO_PRIV:
Chris@0 63 $flag = FILTER_FLAG_NO_PRIV_RANGE;
Chris@0 64 break;
Chris@0 65
Chris@0 66 case Ip::V4_NO_RES:
Chris@0 67 $flag = FILTER_FLAG_IPV4 | FILTER_FLAG_NO_RES_RANGE;
Chris@0 68 break;
Chris@0 69
Chris@0 70 case Ip::V6_NO_RES:
Chris@0 71 $flag = FILTER_FLAG_IPV6 | FILTER_FLAG_NO_RES_RANGE;
Chris@0 72 break;
Chris@0 73
Chris@0 74 case Ip::ALL_NO_RES:
Chris@0 75 $flag = FILTER_FLAG_NO_RES_RANGE;
Chris@0 76 break;
Chris@0 77
Chris@0 78 case Ip::V4_ONLY_PUBLIC:
Chris@0 79 $flag = FILTER_FLAG_IPV4 | FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE;
Chris@0 80 break;
Chris@0 81
Chris@0 82 case Ip::V6_ONLY_PUBLIC:
Chris@0 83 $flag = FILTER_FLAG_IPV6 | FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE;
Chris@0 84 break;
Chris@0 85
Chris@0 86 case Ip::ALL_ONLY_PUBLIC:
Chris@0 87 $flag = FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE;
Chris@0 88 break;
Chris@0 89
Chris@0 90 default:
Chris@0 91 $flag = null;
Chris@0 92 break;
Chris@0 93 }
Chris@0 94
Chris@0 95 if (!filter_var($value, FILTER_VALIDATE_IP, $flag)) {
Chris@0 96 $this->context->buildViolation($constraint->message)
Chris@0 97 ->setParameter('{{ value }}', $this->formatValue($value))
Chris@0 98 ->setCode(Ip::INVALID_IP_ERROR)
Chris@0 99 ->addViolation();
Chris@0 100 }
Chris@0 101 }
Chris@0 102 }