@@ -45,33 +45,17 @@ class AdminForthAuth implements IAdminForthAuth {
4545
4646 getClientIp ( headers : object ) {
4747 const clientIpHeader = this . adminforth . config . auth . clientIpHeader ;
48- console . log ( '👊🏿👊🏿👊🏿get client Ip method called 👊🏿👊🏿👊🏿' )
48+
4949 const headersLower = Object . keys ( headers ) . reduce ( ( acc , key ) => {
5050 acc [ key . toLowerCase ( ) ] = headers [ key ] ;
51- console . log ( `Header: ${ key . toLowerCase ( ) } = ${ headers [ key ] } ` ) ;
52- console . log ( "Returning acc:" , acc ) ;
5351 return acc ;
5452 } , { } ) ;
5553 if ( clientIpHeader ) {
56- console . log ( `Using custom client IP header: ${ clientIpHeader } ` ) ;
5754 return headersLower [ clientIpHeader . toLowerCase ( ) ] || 'unknown' ;
5855 } else {
5956 // first try common headers which can't bee spoofed, in other words
6057 // most common to nginx/traefik/apache
6158 // then fallback to less secure headers
62- console . log ( 'Using default client IP header detection' ) ;
63- console . log ( "returning:" , headersLower [ 'x-forwarded-for' ] ?. split ( ',' ) . shift ( ) . trim ( ) ||
64- headersLower [ 'x-real-ip' ] ||
65- headersLower [ 'x-client-ip' ] ||
66- headersLower [ 'x-cluster-client-ip' ] ||
67- headersLower [ 'forwarded' ] ||
68- headersLower [ 'remote-addr' ] ||
69- headersLower [ 'client-ip' ] ||
70- headersLower [ 'client-address' ] ||
71- headersLower [ 'client' ] ||
72- headersLower [ 'x-host' ] ||
73- null ) ;
74-
7559 return headersLower [ 'x-forwarded-for' ] ?. split ( ',' ) . shift ( ) . trim ( ) ||
7660 headersLower [ 'x-real-ip' ] ||
7761 headersLower [ 'x-client-ip' ] ||
0 commit comments