diff --git a/cookbook/configuration/environments.rst b/cookbook/configuration/environments.rst index 0b8b8776b17..57526912886 100644 --- a/cookbook/configuration/environments.rst +++ b/cookbook/configuration/environments.rst @@ -328,7 +328,7 @@ The new environment is now accessible via:: aren't accessible, the front controller is usually protected from external IP addresses via the following code at the top of the controller:: - if (!in_array(@$_SERVER['REMOTE_ADDR'], array('127.0.0.1', 'fe80::1', '::1'))) { + if (!in_array(@$_SERVER['REMOTE_ADDR'], array('127.0.0.1', '::1'))) { die('You are not allowed to access this file. Check '.basename(__FILE__).' for more information.'); } diff --git a/cookbook/security/access_control.rst b/cookbook/security/access_control.rst index ecc177e7a50..07ea923651b 100644 --- a/cookbook/security/access_control.rst +++ b/cookbook/security/access_control.rst @@ -176,7 +176,7 @@ pattern so that it is only accessible by requests from the local server itself: # ... access_control: # - - { path: ^/internal, roles: IS_AUTHENTICATED_ANONYMOUSLY, ips: [127.0.0.1, fe80::1, ::1] } + - { path: ^/internal, roles: IS_AUTHENTICATED_ANONYMOUSLY, ips: [127.0.0.1, ::1] } - { path: ^/internal, roles: ROLE_NO_ACCESS } .. code-block:: xml @@ -193,7 +193,7 @@ pattern so that it is only accessible by requests from the local server itself: @@ -209,7 +209,7 @@ pattern so that it is only accessible by requests from the local server itself: array( 'path' => '^/internal', 'role' => 'IS_AUTHENTICATED_ANONYMOUSLY', - 'ips' => '127.0.0.1, fe80::1, ::1' + 'ips' => '127.0.0.1, ::1' ), array( 'path' => '^/internal', @@ -230,8 +230,8 @@ the external IP address ``10.0.0.1``: that does not match an existing role, it just serves as a trick to always deny access). -But if the same request comes from ``127.0.0.1``, ``::1`` (the IPv6 loopback -address) or ``fe80::1`` (the IPv6 link-local address): +But if the same request comes from ``127.0.0.1`` or ``::1`` (the IPv6 loopback +address): * Now, the first access control rule is enabled as both the ``path`` and the ``ip`` match: access is allowed as the user always has the