TDoG-Skin/vendor/vectorface/whip/README.md

238 lines
7.9 KiB
Markdown
Raw Permalink Normal View History

2024-08-17 18:43:48 +08:00
# Whip
[![Build Status](https://travis-ci.org/Vectorface/whip.svg?branch=master)](https://travis-ci.org/Vectorface/whip)
[![Code Coverage](https://scrutinizer-ci.com/g/Vectorface/whip/badges/coverage.png?b=master)](https://scrutinizer-ci.com/g/Vectorface/whip/?branch=master)
[![Scrutinizer Code Quality](https://scrutinizer-ci.com/g/Vectorface/whip/badges/quality-score.png?b=master)](https://scrutinizer-ci.com/g/Vectorface/whip/?branch=master)
[![Latest Stable Version](https://poser.pugx.org/vectorface/whip/v/stable.svg)](https://packagist.org/packages/vectorface/whip)
[![License](https://poser.pugx.org/vectorface/whip/license.svg)](https://packagist.org/packages/vectorface/whip)
Whip (stands for Which Ip) is a lightweight class for returning a client's IP address in PHP.
## The Problem
It may seem trivial to simply pull the client's IP address from
`$_SERVER['REMOTE_ADDR']` but this address is not always accurate. For example,
if your web servers are behind a reverse proxy like Varnish, the IP address
listed will be that of your proxy and not the client.
Many solutions propose checking multiple headers but those headers can be
spoofed as well and we want to present a final solution anyone can deploy.
## Installing Whip.
Simply run the following [composer](https://getcomposer.org/) command:
```shell
$ composer require vectorface/whip
```
## Using Whip
Add the required `use` statement to your class
```php
use Vectorface\Whip\Whip;
```
To fetch an IP address using every implemented method, you can simply do
```php
$whip = new Whip();
$clientAddress = $whip->getValidIpAddress();
```
The class will attempt every method to retrieve the client's IP address
starting with very specific use cases and falling back to more general use
cases.
Note, that the method `Whip::getValidIpAddress` will return `false` if no
valid IP address could be determined, so it is important to check for errors.
```php
$whip = new Whip();
if (false === ($clientAddress = $whip->getValidIpAddress())) {
// handle the error
}
```
To fetch an IP address using a specific method, you can pass a bitmask of
enabled methods to the constructor. Here is an example of looking up the IP
address using CloudFlare's custom HTTP header, and falling back to
`$_SERVER['REMOTE_ADDR']` otherwise.
```php
$whip = new Whip(Whip::CLOUDFLARE_HEADERS | Whip::REMOTE_ADDR);
$clientAddress = $whip->getValidIpAddress();
```
This method works, but there is the problem that the custom HTTP header can
easily be spoofed if your sites accept traffic not from CloudFlare. To prevent
this, Whip allows you to specify a whitelist of IP addresses (or address ranges)
that you accept per method.
## Using Whip Behind a Trusted Proxy
A common use case is to deploy a trusted proxy (nginx, varnish, and many others)
in front of an application server. To forward the correct client IP, the trusted
proxy should be configured to inject a header for Whip to read with the custom
headers method.
If the trusted proxy is configured to send a X-My-Client-IP header, Whip
could be used as follows:
```php
$whip = new Whip(
Whip::CUSTOM_HEADERS,
[Whip::CUSTOM_HEADERS => [ // Whitelist your proxies.
Whip::IPV4 => ['10.0.0.2', '10.0.0.3']
]]
);
$whip->addCustomHeader('HTTP_X_MY_CLIENT_IP');
$ip = $whip->getValidIpAddress();
```
## Using the CloudFlare IP Range Whitelist
As a common example, Whip can accept a whitelist of IP ranges for CloudFlare
when using their custom header and fall back to `$_SERVER['REMOTE_ADDR']` if the
custom header was not found or if the source IP address does match any in the
whitelist.
```php
$whip = new Whip(
Whip::CLOUDFLARE_HEADERS | Whip::REMOTE_ADDR,
[
Whip::CLOUDFLARE_HEADERS => [
Whip::IPV4 => [
'199.27.128.0/21',
'173.245.48.0/20',
'103.21.244.0/22',
'103.22.200.0/22',
'103.31.4.0/22',
'141.101.64.0/18',
'108.162.192.0/18',
'190.93.240.0/20',
'188.114.96.0/20',
'197.234.240.0/22',
'198.41.128.0/17',
'162.158.0.0/15',
'104.16.0.0/12'
],
Whip::IPV6 => [
'2400:cb00::/32',
'2606:4700::/32',
'2803:f800::/32',
'2405:b500::/32',
'2405:8100::/32'
]
]
]
);
$clientAddress = $whip->getValidIpAddress();
```
Please be sure to use the actual list of IP ranges from CloudFlare for
[IPv4](https://www.cloudflare.com/ips-v4) and
[IPv6](https://www.cloudflare.com/ips-v6).
## List of Methods
The individual methods are stored as integer constants on the `Whip` class.
To combine methods, use the bitwise OR operator `|`. The current methods are:
- `Whip::REMOTE_ADDR` - Uses the standard `$_SERVER['REMOTE_ADDR']`.
- `Whip::PROXY_HEADERS` - Uses any of the following values:
- `$_SERVER['HTTP_CLIENT_IP']`
- `$_SERVER['HTTP_X_FORWARDED_FOR']`
- `$_SERVER['HTTP_X_FORWARDED']`
- `$_SERVER['HTTP_X_CLUSTER_CLIENT_IP']`
- `$_SERVER['HTTP_FORWARDED_FOR']`
- `$_SERVER['HTTP_FORWARDED']`
- `$_SERVER['HTTP_X_REAL_IP']`
- `Whip::CLOUDFLARE_HEADERS` - Uses the CloudFlare provided HTTP header
"CF-Connecting-IP".
- `Whip::INCAPSULA_HEADERS` - Use the Incapsula provided HTTP header
"Incap-Client-IP".
- `Whip::CUSTOM_HEADERS` - Uses a custom list of HTTP headers passed into
`Whip::addCustomHeader`.
Please note that the proxy headers method can be susceptible to client spoofing
because it extracts addresses from several possible HTTP headers. This means
that using the proxy headers method is not appropriate where trust is required,
like in the context of authentication.
## Using a Custom Header
Whip can also allow you to specify a custom header to use. For example, you may
configure your own proxy to send a unique obfuscated header internally that
would be hard to spoof. In this example, we assume Varnish is run locally and
we use a custom HTTP header "X-SECRET-REAL-IP" (and fall back to
`$_SERVER['REMOTE_ADDR']` if the custom header doesn't work).
```php
$whip = new Whip(
Whip::CUSTOM_HEADERS | Whip::REMOTE_ADDR,
[
Whip::CUSTOM_HEADERS => [
Whip::IPV4 => [
'127.0.0.1'
],
Whip::IPV6 => [
'::1'
]
]
]
);
$whip->addCustomHeader('X-SECRET-REAL-IP');
$clientAddress = $whip->getValidIpAddress();
```
## Valid IP Ranges
For IPv4, Whip accepts three types of IP ranges:
- Asterisk wildcard (192.168.\*)
- Dashed range (192.168.0.0-192.168.255.255)
- CIDR bitmask notation (192.168.0.0/16)
For IPv6, Whip only accepts the CIDR bitmask notation (fc00::/7).
Furthermore, you can specify a list of exact IP addresses instead of a list of
ranges.
## IP Range Filtering
Whip can also be used to provide simple IP range matching. For example,
```php
$range = new Vectorface\Whip\IpRange\Ipv4Range('10.0.*');
if ($range->containsIp($ipv4Address)) {
// handle the IP address being within the range
}
$range = new Vectorface\Whip\IpRange\Ipv6Range('::1/32');
if ($range->containsIp($ipv6Address)) {
// handle the IP address being within the range
}
```
## PSR-7 Requests, and Others
Whip supports using [PSR-7 (http-message)](https://github.com/php-fig/fig-standards/blob/master/accepted/PSR-7-http-message.md) request instances in place of the `$_SERVER` superglobal. For example,
```php
// Get a Psr\Http\Message\ServerRequestInterface implementation from somewhere.
$request = ServerRequestFactory::fromGlobals();
// You can pass the request in the constructor.
$whip = new Whip(Whip::REMOTE_ADDR, [], $request);
// ... or set the request as the source of data.
$whip->setSource($request);
// ... or pass it to any function accepting a source argument.
$ip = $whip->getValidIpAddress($request);
```
Other request formats can be supported via a RequestAdapter (src/Request/RequestAdapter) implementation.