Chris@0
|
1 <?php
|
Chris@0
|
2
|
Chris@0
|
3 /*
|
Chris@0
|
4 * This file is part of the Symfony package.
|
Chris@0
|
5 *
|
Chris@0
|
6 * (c) Fabien Potencier <fabien@symfony.com>
|
Chris@0
|
7 *
|
Chris@0
|
8 * For the full copyright and license information, please view the LICENSE
|
Chris@0
|
9 * file that was distributed with this source code.
|
Chris@0
|
10 */
|
Chris@0
|
11
|
Chris@0
|
12 namespace Symfony\Component\Validator\Constraints;
|
Chris@0
|
13
|
Chris@0
|
14 use Symfony\Component\Validator\Constraint;
|
Chris@0
|
15 use Symfony\Component\Validator\ConstraintValidator;
|
Chris@0
|
16 use Symfony\Component\Validator\Exception\UnexpectedTypeException;
|
Chris@0
|
17
|
Chris@0
|
18 /**
|
Chris@0
|
19 * Validates whether a value is a valid IP address.
|
Chris@0
|
20 *
|
Chris@0
|
21 * @author Bernhard Schussek <bschussek@gmail.com>
|
Chris@0
|
22 * @author Joseph Bielawski <stloyd@gmail.com>
|
Chris@0
|
23 */
|
Chris@0
|
24 class IpValidator extends ConstraintValidator
|
Chris@0
|
25 {
|
Chris@0
|
26 /**
|
Chris@0
|
27 * {@inheritdoc}
|
Chris@0
|
28 */
|
Chris@0
|
29 public function validate($value, Constraint $constraint)
|
Chris@0
|
30 {
|
Chris@0
|
31 if (!$constraint instanceof Ip) {
|
Chris@0
|
32 throw new UnexpectedTypeException($constraint, __NAMESPACE__.'\Ip');
|
Chris@0
|
33 }
|
Chris@0
|
34
|
Chris@0
|
35 if (null === $value || '' === $value) {
|
Chris@0
|
36 return;
|
Chris@0
|
37 }
|
Chris@0
|
38
|
Chris@17
|
39 if (!is_scalar($value) && !(\is_object($value) && method_exists($value, '__toString'))) {
|
Chris@0
|
40 throw new UnexpectedTypeException($value, 'string');
|
Chris@0
|
41 }
|
Chris@0
|
42
|
Chris@0
|
43 $value = (string) $value;
|
Chris@0
|
44
|
Chris@0
|
45 switch ($constraint->version) {
|
Chris@0
|
46 case Ip::V4:
|
Chris@0
|
47 $flag = FILTER_FLAG_IPV4;
|
Chris@0
|
48 break;
|
Chris@0
|
49
|
Chris@0
|
50 case Ip::V6:
|
Chris@0
|
51 $flag = FILTER_FLAG_IPV6;
|
Chris@0
|
52 break;
|
Chris@0
|
53
|
Chris@0
|
54 case Ip::V4_NO_PRIV:
|
Chris@0
|
55 $flag = FILTER_FLAG_IPV4 | FILTER_FLAG_NO_PRIV_RANGE;
|
Chris@0
|
56 break;
|
Chris@0
|
57
|
Chris@0
|
58 case Ip::V6_NO_PRIV:
|
Chris@0
|
59 $flag = FILTER_FLAG_IPV6 | FILTER_FLAG_NO_PRIV_RANGE;
|
Chris@0
|
60 break;
|
Chris@0
|
61
|
Chris@0
|
62 case Ip::ALL_NO_PRIV:
|
Chris@0
|
63 $flag = FILTER_FLAG_NO_PRIV_RANGE;
|
Chris@0
|
64 break;
|
Chris@0
|
65
|
Chris@0
|
66 case Ip::V4_NO_RES:
|
Chris@0
|
67 $flag = FILTER_FLAG_IPV4 | FILTER_FLAG_NO_RES_RANGE;
|
Chris@0
|
68 break;
|
Chris@0
|
69
|
Chris@0
|
70 case Ip::V6_NO_RES:
|
Chris@0
|
71 $flag = FILTER_FLAG_IPV6 | FILTER_FLAG_NO_RES_RANGE;
|
Chris@0
|
72 break;
|
Chris@0
|
73
|
Chris@0
|
74 case Ip::ALL_NO_RES:
|
Chris@0
|
75 $flag = FILTER_FLAG_NO_RES_RANGE;
|
Chris@0
|
76 break;
|
Chris@0
|
77
|
Chris@0
|
78 case Ip::V4_ONLY_PUBLIC:
|
Chris@0
|
79 $flag = FILTER_FLAG_IPV4 | FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE;
|
Chris@0
|
80 break;
|
Chris@0
|
81
|
Chris@0
|
82 case Ip::V6_ONLY_PUBLIC:
|
Chris@0
|
83 $flag = FILTER_FLAG_IPV6 | FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE;
|
Chris@0
|
84 break;
|
Chris@0
|
85
|
Chris@0
|
86 case Ip::ALL_ONLY_PUBLIC:
|
Chris@0
|
87 $flag = FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE;
|
Chris@0
|
88 break;
|
Chris@0
|
89
|
Chris@0
|
90 default:
|
Chris@0
|
91 $flag = null;
|
Chris@0
|
92 break;
|
Chris@0
|
93 }
|
Chris@0
|
94
|
Chris@0
|
95 if (!filter_var($value, FILTER_VALIDATE_IP, $flag)) {
|
Chris@0
|
96 $this->context->buildViolation($constraint->message)
|
Chris@0
|
97 ->setParameter('{{ value }}', $this->formatValue($value))
|
Chris@0
|
98 ->setCode(Ip::INVALID_IP_ERROR)
|
Chris@0
|
99 ->addViolation();
|
Chris@0
|
100 }
|
Chris@0
|
101 }
|
Chris@0
|
102 }
|