@@ -45,6 +45,8 @@ public function testRenderWithObjectsAsAttributes()
45
45
$ subRequest ->attributes ->replace (array ('object ' => $ object , '_format ' => 'html ' , '_controller ' => 'main_controller ' , '_locale ' => 'en ' ));
46
46
$ subRequest ->headers ->set ('x-forwarded-for ' , array ('127.0.0.1 ' ));
47
47
$ subRequest ->headers ->set ('forwarded ' , array ('for="127.0.0.1";host="localhost";proto=http ' ));
48
+ $ subRequest ->server ->set ('HTTP_X_FORWARDED_FOR ' , '127.0.0.1 ' );
49
+ $ subRequest ->server ->set ('HTTP_FORWARDED ' , 'for="127.0.0.1";host="localhost";proto=http ' );
48
50
49
51
$ strategy = new InlineFragmentRenderer ($ this ->getKernelExpectingRequest ($ subRequest ));
50
52
@@ -57,6 +59,7 @@ public function testRenderWithTrustedHeaderDisabled()
57
59
58
60
$ expectedSubRequest = Request::create ('/ ' );
59
61
$ expectedSubRequest ->headers ->set ('x-forwarded-for ' , array ('127.0.0.1 ' ));
62
+ $ expectedSubRequest ->server ->set ('HTTP_X_FORWARDED_FOR ' , '127.0.0.1 ' );
60
63
61
64
$ strategy = new InlineFragmentRenderer ($ this ->getKernelExpectingRequest ($ expectedSubRequest ));
62
65
$ this ->assertSame ('foo ' , $ strategy ->render ('/ ' , Request::create ('/ ' ))->getContent ());
@@ -149,8 +152,10 @@ public function testESIHeaderIsKeptInSubrequest()
149
152
150
153
if (Request::HEADER_X_FORWARDED_FOR & Request::getTrustedHeaderSet ()) {
151
154
$ expectedSubRequest ->headers ->set ('x-forwarded-for ' , array ('127.0.0.1 ' ));
155
+ $ expectedSubRequest ->server ->set ('HTTP_X_FORWARDED_FOR ' , '127.0.0.1 ' );
152
156
}
153
157
$ expectedSubRequest ->headers ->set ('forwarded ' , array ('for="127.0.0.1";host="localhost";proto=http ' ));
158
+ $ expectedSubRequest ->server ->set ('HTTP_FORWARDED ' , 'for="127.0.0.1";host="localhost";proto=http ' );
154
159
155
160
$ strategy = new InlineFragmentRenderer ($ this ->getKernelExpectingRequest ($ expectedSubRequest ));
156
161
@@ -173,6 +178,8 @@ public function testHeadersPossiblyResultingIn304AreNotAssignedToSubrequest()
173
178
$ expectedSubRequest = Request::create ('/ ' );
174
179
$ expectedSubRequest ->headers ->set ('x-forwarded-for ' , array ('127.0.0.1 ' ));
175
180
$ expectedSubRequest ->headers ->set ('forwarded ' , array ('for="127.0.0.1";host="localhost";proto=http ' ));
181
+ $ expectedSubRequest ->server ->set ('HTTP_X_FORWARDED_FOR ' , '127.0.0.1 ' );
182
+ $ expectedSubRequest ->server ->set ('HTTP_FORWARDED ' , 'for="127.0.0.1";host="localhost";proto=http ' );
176
183
177
184
$ strategy = new InlineFragmentRenderer ($ this ->getKernelExpectingRequest ($ expectedSubRequest ));
178
185
$ request = Request::create ('/ ' , 'GET ' , array (), array (), array (), array ('HTTP_IF_MODIFIED_SINCE ' => 'Fri, 01 Jan 2016 00:00:00 GMT ' , 'HTTP_IF_NONE_MATCH ' => '* ' ));
@@ -188,6 +195,8 @@ public function testFirstTrustedProxyIsSetAsRemote()
188
195
$ expectedSubRequest ->server ->set ('REMOTE_ADDR ' , '127.0.0.1 ' );
189
196
$ expectedSubRequest ->headers ->set ('x-forwarded-for ' , array ('127.0.0.1 ' ));
190
197
$ expectedSubRequest ->headers ->set ('forwarded ' , array ('for="127.0.0.1";host="localhost";proto=http ' ));
198
+ $ expectedSubRequest ->server ->set ('HTTP_X_FORWARDED_FOR ' , '127.0.0.1 ' );
199
+ $ expectedSubRequest ->server ->set ('HTTP_FORWARDED ' , 'for="127.0.0.1";host="localhost";proto=http ' );
191
200
192
201
$ strategy = new InlineFragmentRenderer ($ this ->getKernelExpectingRequest ($ expectedSubRequest ));
193
202
@@ -205,6 +214,8 @@ public function testIpAddressOfRangedTrustedProxyIsSetAsRemote()
205
214
$ expectedSubRequest ->server ->set ('REMOTE_ADDR ' , '127.0.0.1 ' );
206
215
$ expectedSubRequest ->headers ->set ('x-forwarded-for ' , array ('127.0.0.1 ' ));
207
216
$ expectedSubRequest ->headers -><
5625
span class=pl-en>set('forwarded ' , array ('for="127.0.0.1";host="localhost";proto=http ' ));
217
+ $ expectedSubRequest ->server ->set ('HTTP_X_FORWARDED_FOR ' , '127.0.0.1 ' );
218
+ $ expectedSubRequest ->server ->set ('HTTP_FORWARDED ' , 'for="127.0.0.1";host="localhost";proto=http ' );
208
219
209
220
Request::setTrustedProxies (array ('1.1.1.1/24 ' ), -1 );
210
221
0 commit comments