diff options
Diffstat (limited to 'tests/draft-future/optional/format/ipv4.json')
-rw-r--r-- | tests/draft-future/optional/format/ipv4.json | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/tests/draft-future/optional/format/ipv4.json b/tests/draft-future/optional/format/ipv4.json new file mode 100644 index 0000000..e36a381 --- /dev/null +++ b/tests/draft-future/optional/format/ipv4.json @@ -0,0 +1,49 @@ +[ + { + "description": "validation of IP addresses", + "schema": {"format": "ipv4"}, + "tests": [ + { + "description": "a valid IP address", + "data": "192.168.0.1", + "valid": true + }, + { + "description": "an IP address with too many components", + "data": "127.0.0.0.1", + "valid": false + }, + { + "description": "an IP address with out-of-range values", + "data": "256.256.256.256", + "valid": false + }, + { + "description": "an IP address without 4 components", + "data": "127.0", + "valid": false + }, + { + "description": "an IP address as an integer", + "data": "0x7f000001", + "valid": false + }, + { + "description": "an IP address as an integer (decimal)", + "data": "2130706433", + "valid": false + }, + { + "description": "leading zeroes should be rejected, as they are treated as octals", + "comment": "see https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/", + "data": "087.10.0.1", + "valid": false + }, + { + "description": "value without leading zero is valid", + "data": "87.10.0.1", + "valid": true + } + ] + } +] |