cuelang.org/go@v0.13.0/encoding/jsonschema/testdata/external/tests/draft7/optional/format/ipv4.json (about) 1 [ 2 { 3 "description": "validation of IP addresses", 4 "schema": { 5 "format": "ipv4" 6 }, 7 "tests": [ 8 { 9 "description": "all string formats ignore integers", 10 "data": 12, 11 "valid": true 12 }, 13 { 14 "description": "all string formats ignore floats", 15 "data": 13.7, 16 "valid": true 17 }, 18 { 19 "description": "all string formats ignore objects", 20 "data": {}, 21 "valid": true 22 }, 23 { 24 "description": "all string formats ignore arrays", 25 "data": [], 26 "valid": true 27 }, 28 { 29 "description": "all string formats ignore booleans", 30 "data": false, 31 "valid": true 32 }, 33 { 34 "description": "all string formats ignore nulls", 35 "data": null, 36 "valid": true 37 }, 38 { 39 "description": "a valid IP address", 40 "data": "192.168.0.1", 41 "valid": true 42 }, 43 { 44 "description": "an IP address with too many components", 45 "data": "127.0.0.0.1", 46 "valid": false, 47 "skip": { 48 "v2": "unexpected success", 49 "v3": "unexpected success" 50 } 51 }, 52 { 53 "description": "an IP address with out-of-range values", 54 "data": "256.256.256.256", 55 "valid": false, 56 "skip": { 57 "v2": "unexpected success", 58 "v3": "unexpected success" 59 } 60 }, 61 { 62 "description": "an IP address without 4 components", 63 "data": "127.0", 64 "valid": false, 65 "skip": { 66 "v2": "unexpected success", 67 "v3": "unexpected success" 68 } 69 }, 70 { 71 "description": "an IP address as an integer", 72 "data": "0x7f000001", 73 "valid": false, 74 "skip": { 75 "v2": "unexpected success", 76 "v3": "unexpected success" 77 } 78 }, 79 { 80 "description": "an IP address as an integer (decimal)", 81 "data": "2130706433", 82 "valid": false, 83 "skip": { 84 "v2": "unexpected success", 85 "v3": "unexpected success" 86 } 87 }, 88 { 89 "description": "invalid leading zeroes, as they are treated as octals", 90 "comment": "see https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/", 91 "data": "087.10.0.1", 92 "valid": false, 93 "skip": { 94 "v2": "unexpected success", 95 "v3": "unexpected success" 96 } 97 }, 98 { 99 "description": "value without leading zero is valid", 100 "data": "87.10.0.1", 101 "valid": true 102 }, 103 { 104 "description": "invalid non-ASCII '২' (a Bengali 2)", 105 "data": "1২7.0.0.1", 106 "valid": false, 107 "skip": { 108 "v2": "unexpected success", 109 "v3": "unexpected success" 110 } 111 }, 112 { 113 "description": "netmask is not a part of ipv4 address", 114 "data": "192.168.1.0/24", 115 "valid": false, 116 "skip": { 117 "v2": "unexpected success", 118 "v3": "unexpected success" 119 } 120 } 121 ] 122 } 123 ]