mirror of
https://github.com/snipe/snipe-it.git
synced 2024-11-16 02:24:09 -08:00
934afa036f
Shift automatically applies the Laravel coding style - which uses the PSR-2 coding style as a base with some minor additions. You may customize the adopted coding style by adding your own [PHP CS Fixer][1] `.php_cs` config file to your project root. Feel free to use [Shift's Laravel ruleset][2] to help you get started. [1]: https://github.com/FriendsOfPHP/PHP-CS-Fixer [2]: https://gist.github.com/laravel-shift/cab527923ed2a109dda047b97d53c200
63 lines
2 KiB
PHP
63 lines
2 KiB
PHP
<?php
|
|
|
|
/*
|
|
|--------------------------------------------------------------------------
|
|
| DO NOT EDIT THIS FILE DIRECTLY.
|
|
|--------------------------------------------------------------------------
|
|
| This file reads from your .env configuration file and should not
|
|
| be modified directly.
|
|
*/
|
|
|
|
return [
|
|
|
|
/*
|
|
* Set trusted proxy IP addresses.
|
|
*
|
|
* Both IPv4 and IPv6 addresses are
|
|
* supported, along with CIDR notation.
|
|
*
|
|
* The "*" character is syntactic sugar
|
|
* within TrustedProxy to trust any proxy
|
|
* that connects directly to your server,
|
|
* a requirement when you cannot know the address
|
|
* of your proxy (e.g. if using ELB or similar).
|
|
*
|
|
* The "**" character is syntactic sugar within
|
|
* TrustedProxy to trust not just any proxy that
|
|
* connects directly to your server, but also
|
|
* proxies that connect to those proxies, and all
|
|
* the way back until you reach the original source
|
|
* IP. It will mean that $request->getClientIp()
|
|
* always gets the originating client IP, no matter
|
|
* how many proxies that client's request has
|
|
* subsequently passed through.
|
|
*/
|
|
'proxies' => env('APP_TRUSTED_PROXIES') !== null ?
|
|
explode(',', env('APP_TRUSTED_PROXIES')) : '*',
|
|
|
|
/*
|
|
* To trust one or more specific proxies that connect
|
|
* directly to your server, use an array of IP addresses:
|
|
*/
|
|
// 'proxies' => ['192.168.1.1'],
|
|
|
|
/*
|
|
* Or, to trust all proxies that connect
|
|
* directly to your server, use a "*"
|
|
*/
|
|
// 'proxies' => '*',
|
|
|
|
/*
|
|
* Which headers to use to detect proxy related data (For, Host, Proto, Port)
|
|
*
|
|
* Options include:
|
|
*
|
|
* - Illuminate\Http\Request::HEADER_X_FORWARDED_ALL (use all x-forwarded-* headers to establish trust)
|
|
* - Illuminate\Http\Request::HEADER_FORWARDED (use the FORWARDED header to establish trust)
|
|
*
|
|
* @link https://symfony.com/doc/current/deployment/proxies.html
|
|
*/
|
|
'headers' => Illuminate\Http\Request::HEADER_X_FORWARDED_ALL,
|
|
|
|
];
|