diff --git a/config/trustedproxy.php b/config/trustedproxy.php new file mode 100644 index 000000000..c1760266c --- /dev/null +++ b/config/trustedproxy.php @@ -0,0 +1,27 @@ +getClientIp() + * always gets the originating client IP, no matter + * how many proxies that client's request has + * subsequently passed through. + */ + 'proxies' => explode(env('TRUST_PROXIES', ''), ','), +]; diff --git a/config/trustproxies.php b/config/trustproxies.php deleted file mode 100644 index 44ddf94a8..000000000 --- a/config/trustproxies.php +++ /dev/null @@ -1,56 +0,0 @@ -getClientIp() - * always gets the originating client IP, no matter - * how many proxies that client's request has - * subsequently passed through. - */ - 'proxies' => explode(env('TRUST_PROXIES', ''), ','), - - /* - * Default Header Names - * - * Change these if the proxy does - * not send the default header names. - * - * Note that headers such as X-Forwarded-For - * are transformed to HTTP_X_FORWARDED_FOR format. - * - * The following are Symfony defaults, found in - * \Symfony\Component\HttpFoundation\Request::$trustedHeaders - * - * You may optionally set headers to 'null' here if you'd like - * for them to be considered untrusted instead. Ex: - * - * Illuminate\Http\Request::HEADER_CLIENT_HOST => null, - * - * WARNING: If you're using AWS Elastic Load Balancing or Heroku, - * the FORWARDED and X_FORWARDED_HOST headers should be set to null - * as they are currently unsupported there. - */ - 'headers' => [ - (defined('Illuminate\Http\Request::HEADER_FORWARDED') ? Illuminate\Http\Request::HEADER_FORWARDED : 'forwarded') => 'FORWARDED', - Illuminate\Http\Request::HEADER_CLIENT_IP => 'X_FORWARDED_FOR', - Illuminate\Http\Request::HEADER_CLIENT_HOST => 'X_FORWARDED_HOST', - Illuminate\Http\Request::HEADER_CLIENT_PROTO => 'X_FORWARDED_PROTO', - Illuminate\Http\Request::HEADER_CLIENT_PORT => 'X_FORWARDED_PORT', - ] -];