CGI-Application-Plugin-RemoteIP

 view release on metacpan or  search on metacpan

lib/CGI/Application/Plugin/RemoteIP.pm  view on Meta::CPAN


=head1 NAME

CGI::Application::Plugin::RemoteIP - Unified Remote IP handling

=head1 SYNOPSIS

  use CGI::Application::Plugin::RemoteIP;


  # Your application
  sub run_mode {
    my ($self) = ( @_);

    my $ip = $self->remote_ip();
  }

=cut


=head1 DESCRIPTION

This module simplifies the detection of the remote IP address of your visitors.

=cut

=head1 MOTIVATION

This module allows you to remove scattered references in your code, such as:

=for example begin

    # Get IP
    my $ip = $ENV{'REMOTE_ADDR'};

    # Remove faux IPv6-prefix.
    $ip =~ s/^::ffff://g;
    ..

=for example end

Instead your code and use the simpler expression:

=for example begin

    my $ip = $self->remote_ip();

=for example end

=cut

=head1 SECURITY

The code in this module will successfully understand the C<X-Forwarded-For>
header and B<trust> it.

Unless you have setup any proxy, or webserver, to scrub this header this means
the value that is used is at risk of being spoofed, bogus, or otherwise
malicious.

=cut

use strict;
use warnings;

package CGI::Application::Plugin::RemoteIP;


our $VERSION = '0.1';


=head1 METHODS


=head2 import

Add our three public-methods into the caller's namespace:

=over 8

=item remote_ip

The remote IP of the client.

=item is_ipv4

A method to return 1 if the visitor is using IPv4 and 0 otherwise.

=item is_ipv6

A method to return 1 if the visitor is using IPv6 and 0 otherwise.

=back

=cut

sub import
{
    my $pkg     = shift;
    my $callpkg = caller;

    {
        ## no critic
        no strict qw(refs);
        ## use critic
        *{ $callpkg . '::remote_ip' } = \&remote_ip;
        *{ $callpkg . '::is_ipv6' }   = \&is_ipv6;
        *{ $callpkg . '::is_ipv4' }   = \&is_ipv4;
    }
}


=head2 remote_ip

Return the remote IP of the visitor, whether via the C<X-Forwarded-For> header
or via the standard CGI environmental variable C<REMOTE_ADDR>.

=cut

sub remote_ip
{
    my $cgi_app = shift;

    # X-Forwarded-For header is the first thing we look for.
    my $forwarded = $ENV{ 'HTTP_X_FORWARDED_FOR' } || "";
    if ( length $forwarded )
    {

        # Split in case there are multiple values
        my @vals = split( /[ ,]/, $forwarded );

        if (@vals)
        {

            # Get the first/trusted value.
            my $ip = $vals[0];

            # drop IPv6 prefix
            $ip =~ s/^::ffff://gi;

            # Drop any optional port
            $ip =~ s/:([0-9]+)$//g;

            return $ip;
        }
    }

    # This should always work.
    my $ip = $ENV{ 'REMOTE_ADDR' } || "";

    # drop IPv6 prefix
    $ip =~ s/^::ffff://gi;

    # Drop any optional port
    $ip =~ s/:([0-9]+)$//g;

    return ($ip);

}


=head2 is_ipv4

Determine whether the remote IP address is IPv4.

=cut

sub is_ipv4
{

    # Get the IP
    my $self = shift;
    my $ip   = $self->remote_ip();

    # Dotted quad?
    if ( $ip =~ /^([0-9]+)\.([0-9]+)\.([0-9]+)\.([0-9]+)$/ )
    {
        return 1;
    }
    else
    {
        return 0;
    }
}



( run in 1.581 second using v1.01-cache-2.11-cpan-39bf76dae61 )