@@ -37,9 +37,6 @@ and what headers your reverse proxy uses to send information:
37
37
trusted_headers : ['x-forwarded-for', 'x-forwarded-host', 'x-forwarded-proto', 'x-forwarded-port']
38
38
// or, if your proxy instead uses the "Forwarded" header
39
39
trusted_headers : ['forwarded']
40
- // or, if you're using a wellknown proxy
41
- trusted_headers : [!php/const Symfony\\Component\\HttpFoundation\\Request::HEADER_X_FORWARDED_AWS_ELB]
42
- trusted_headers : [!php/const Symfony\\Component\\HttpFoundation\\Request::HEADER_X_FORWARDED_TRAEFIK]
43
40
44
41
.. code-block :: xml
45
42
@@ -80,9 +77,6 @@ and what headers your reverse proxy uses to send information:
80
77
'trusted_headers' => ['x-forwarded-for', 'x-forwarded-host', 'x-forwarded-proto', 'x-forwarded-port'],
81
78
// or, if your proxy instead uses the "Forwarded" header
82
79
'trusted_headers' => ['forwarded'],
83
- // or, if you're using a wellknown proxy
84
- 'trusted_headers' => [Request::HEADER_X_FORWARDED_AWS_ELB],
85
- 'trusted_headers' => [Request::HEADER_X_FORWARDED_TRAEFIK],
86
80
]);
87
81
88
82
.. deprecated :: 5.2
@@ -135,9 +129,6 @@ In this case, you'll need to - *very carefully* - trust *all* proxies.
135
129
// run time by $_SERVER['REMOTE_ADDR'])
136
130
trusted_proxies : ' 127.0.0.1,REMOTE_ADDR'
137
131
138
- // if you're using ELB, otherwise use another Request::HEADER-* constant
139
- trusted_headers : [!php/const Symfony\\Component\\HttpFoundation\\Request::HEADER_X_FORWARDED_AWS_ELB, '!x-forwarded-host', '!x-forwarded-prefix']
140
-
141
132
That's it! It's critical that you prevent traffic from all non-trusted sources.
142
133
If you allow outside traffic, they could "spoof" their true IP address and
143
134
other information.
0 commit comments