line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Net::IP::Match::Regexp; |
2
|
|
|
|
|
|
|
|
3
|
1
|
|
|
1
|
|
30031
|
use 5.006; |
|
1
|
|
|
|
|
3
|
|
|
1
|
|
|
|
|
29
|
|
4
|
1
|
|
|
1
|
|
5
|
use strict; |
|
1
|
|
|
|
|
1
|
|
|
1
|
|
|
|
|
33
|
|
5
|
1
|
|
|
1
|
|
4
|
use warnings; |
|
1
|
|
|
|
|
7
|
|
|
1
|
|
|
|
|
26
|
|
6
|
1
|
|
|
1
|
|
739
|
use English qw(-no_match_vars); |
|
1
|
|
|
|
|
4486
|
|
|
1
|
|
|
|
|
5
|
|
7
|
|
|
|
|
|
|
|
8
|
1
|
|
|
1
|
|
499
|
use base 'Exporter'; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
580
|
|
9
|
|
|
|
|
|
|
our @EXPORT_OK = qw( create_iprange_regexp create_iprange_regexp_depthfirst match_ip ); |
10
|
|
|
|
|
|
|
our $VERSION = '1.01'; |
11
|
|
|
|
|
|
|
|
12
|
|
|
|
|
|
|
=head1 NAME |
13
|
|
|
|
|
|
|
|
14
|
|
|
|
|
|
|
Net::IP::Match::Regexp - Efficiently match IP addresses against ranges |
15
|
|
|
|
|
|
|
|
16
|
|
|
|
|
|
|
=head1 LICENSE |
17
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
Copyright 2005-2006 Clotho Advanced Media, Inc., |
19
|
|
|
|
|
|
|
|
20
|
|
|
|
|
|
|
Copyright 2007-2008 Chris Dolan, |
21
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
This library is free software; you can redistribute it and/or modify it |
23
|
|
|
|
|
|
|
under the same terms as Perl itself. |
24
|
|
|
|
|
|
|
|
25
|
|
|
|
|
|
|
=head1 SYNOPSIS |
26
|
|
|
|
|
|
|
|
27
|
|
|
|
|
|
|
use Net::IP::Match::Regexp qw( create_iprange_regexp match_ip ); |
28
|
|
|
|
|
|
|
|
29
|
|
|
|
|
|
|
my $regexp = create_iprange_regexp( |
30
|
|
|
|
|
|
|
qw( 10.0.0.0/8 87.134.66.128 87.134.87.0/24 145.97.0.0/16 ) |
31
|
|
|
|
|
|
|
); |
32
|
|
|
|
|
|
|
if (match_ip('209.249.163.62', $regexp)) { |
33
|
|
|
|
|
|
|
... |
34
|
|
|
|
|
|
|
} |
35
|
|
|
|
|
|
|
|
36
|
|
|
|
|
|
|
=head1 DESCRIPTION |
37
|
|
|
|
|
|
|
|
38
|
|
|
|
|
|
|
This module allows you to check an IP address against one or more IP |
39
|
|
|
|
|
|
|
ranges. It employs Perl's highly optimized regular expression engine |
40
|
|
|
|
|
|
|
to do the hard work, so it is very fast. It is optimized for speed by |
41
|
|
|
|
|
|
|
doing the match against a regexp which implicitly checks the broadest |
42
|
|
|
|
|
|
|
IP ranges first. An advantage is that the regexp can be computed and |
43
|
|
|
|
|
|
|
stored in advance (in source code, in a database table, etc) and |
44
|
|
|
|
|
|
|
reused, saving much time if the IP ranges don't change too often. The |
45
|
|
|
|
|
|
|
match can optionally report a value (e.g. a network name) instead of |
46
|
|
|
|
|
|
|
just a boolean, which makes module useful for mapping IP ranges to |
47
|
|
|
|
|
|
|
names or codes or anything else. |
48
|
|
|
|
|
|
|
|
49
|
|
|
|
|
|
|
=head1 LIMITATIONS |
50
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
This module does not yet support IPv6 addresses, although that feature |
52
|
|
|
|
|
|
|
should not be hard to implement as long as the regexps start with a 4 |
53
|
|
|
|
|
|
|
vs. 6 flag. Patches welcome. :-) |
54
|
|
|
|
|
|
|
|
55
|
|
|
|
|
|
|
This module only accepts IP ranges in C (aka CIDR) |
56
|
|
|
|
|
|
|
notation. To work around that limitation, I recommend |
57
|
|
|
|
|
|
|
Net::CIDR::Lite to conveniently convert collections of IP address |
58
|
|
|
|
|
|
|
ranges into CIDR format. |
59
|
|
|
|
|
|
|
|
60
|
|
|
|
|
|
|
This module makes no effort to validate the IP addresses or ranges |
61
|
|
|
|
|
|
|
passed as arguments. If you pass address ranges like |
62
|
|
|
|
|
|
|
C<1000.0.0.0/300>, you will probably get weird regexps out. |
63
|
|
|
|
|
|
|
|
64
|
|
|
|
|
|
|
=head1 FUNCTIONS |
65
|
|
|
|
|
|
|
|
66
|
|
|
|
|
|
|
=over |
67
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
=cut |
69
|
|
|
|
|
|
|
|
70
|
|
|
|
|
|
|
=item create_iprange_regexp($iprange | $hashref | $arrayref, ...) |
71
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
This function digests IP ranges into a regular expression that can |
73
|
|
|
|
|
|
|
subsequently be used to efficiently test single IP addresses. It |
74
|
|
|
|
|
|
|
returns a regular expression string that can be passed to match_ip(). |
75
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
The simple way to use this is to pass a list of IP ranges as |
77
|
|
|
|
|
|
|
C. When used this way, the return value of the |
78
|
|
|
|
|
|
|
match_ip() function will be simply C<1> or C. |
79
|
|
|
|
|
|
|
|
80
|
|
|
|
|
|
|
The more complex way is to pass a hash reference of IP range => return |
81
|
|
|
|
|
|
|
value pairs. When used this way, the return value of the match_ip() |
82
|
|
|
|
|
|
|
function will be the specified return value or C for no match. |
83
|
|
|
|
|
|
|
|
84
|
|
|
|
|
|
|
For example: |
85
|
|
|
|
|
|
|
|
86
|
|
|
|
|
|
|
my $re1 = create_iprange_regexp('209.249.163.0/25', '127.0.0.1/32'); |
87
|
|
|
|
|
|
|
print match_ip('209.249.163.62', $re1); # prints '1' |
88
|
|
|
|
|
|
|
|
89
|
|
|
|
|
|
|
my $re2 = create_iprange_regexp({'209.249.163.0/25' => 'clotho.com', |
90
|
|
|
|
|
|
|
'127.0.0.1/32' => 'localhost'}); |
91
|
|
|
|
|
|
|
print match_ip('209.249.163.62', $re2); # prints 'clotho.com' |
92
|
|
|
|
|
|
|
|
93
|
|
|
|
|
|
|
Be aware that the value string will be wrapped in single quotes in the |
94
|
|
|
|
|
|
|
regexp. Therefore, you must double-escape any single quotes in that |
95
|
|
|
|
|
|
|
value. For example: |
96
|
|
|
|
|
|
|
|
97
|
|
|
|
|
|
|
create_iprange_regexp({'208.201.239.36/31' => 'O\\'Reilly publishing'}); |
98
|
|
|
|
|
|
|
|
99
|
|
|
|
|
|
|
Note that the scalar and hash styles can be mixed (a rarely used |
100
|
|
|
|
|
|
|
feature). These two examples are equivalent: |
101
|
|
|
|
|
|
|
|
102
|
|
|
|
|
|
|
create_iprange_regexp('127.0.0.1/32', |
103
|
|
|
|
|
|
|
{'209.249.163.0/25' => 'clotho.com'}, |
104
|
|
|
|
|
|
|
'10.0.0.0/8', |
105
|
|
|
|
|
|
|
{'192.168.0.0/16' => 'LAN'}); |
106
|
|
|
|
|
|
|
|
107
|
|
|
|
|
|
|
create_iprange_regexp({'127.0.0.1/32' => 1, |
108
|
|
|
|
|
|
|
'209.249.163.0/25' => 'clotho.com', |
109
|
|
|
|
|
|
|
'10.0.0.0/8' => 1, |
110
|
|
|
|
|
|
|
'192.168.0.0/16' => 'LAN'}); |
111
|
|
|
|
|
|
|
|
112
|
|
|
|
|
|
|
If any of the IP ranges are overlapping, the broadest one is used. If |
113
|
|
|
|
|
|
|
they are equivalent, then the first one passed is used. If you have |
114
|
|
|
|
|
|
|
some data that might be ambiguous, you pass an arrayref instead of a |
115
|
|
|
|
|
|
|
hashref, but it's better to clean up your data instead! For example: |
116
|
|
|
|
|
|
|
|
117
|
|
|
|
|
|
|
my $re = create_iprange_regexp(['1.1.1.0/31' => 'zero', '1.1.1.1/31' => 'one']); |
118
|
|
|
|
|
|
|
print match_ip('1.1.1.1', $re)); # prints 'zero', since both match |
119
|
|
|
|
|
|
|
|
120
|
|
|
|
|
|
|
WARNING: This function does no checking for validity of IP ranges. It |
121
|
|
|
|
|
|
|
happily accepts C<1000.0.0.0/-38> and makes a garbage regexp. |
122
|
|
|
|
|
|
|
Hopefully a future version will validate the ranges, perhaps via |
123
|
|
|
|
|
|
|
Net::CIDR or Net::IP. |
124
|
|
|
|
|
|
|
|
125
|
|
|
|
|
|
|
=cut |
126
|
|
|
|
|
|
|
|
127
|
|
|
|
|
|
|
sub create_iprange_regexp { ##no critic (ArgUnpacking) |
128
|
79
|
|
|
79
|
1
|
34089
|
return _build_regexp(0, \@_); |
129
|
|
|
|
|
|
|
} |
130
|
|
|
|
|
|
|
|
131
|
|
|
|
|
|
|
=item create_iprange_regexp_depthfirst($iprange | $hashref | $arrayref, ...) |
132
|
|
|
|
|
|
|
|
133
|
|
|
|
|
|
|
Returns a regexp in matches the most specific IP range instead of the |
134
|
|
|
|
|
|
|
broadest range. Example: |
135
|
|
|
|
|
|
|
|
136
|
|
|
|
|
|
|
my $re = create_iprange_regexp_depthfirst({'192.168.0.0/16' => 'LAN', |
137
|
|
|
|
|
|
|
'192.168.0.1' => 'router'}); |
138
|
|
|
|
|
|
|
match_ip('192.168.0.1', $re); |
139
|
|
|
|
|
|
|
|
140
|
|
|
|
|
|
|
returns 'router' instead of 'LAN'. |
141
|
|
|
|
|
|
|
|
142
|
|
|
|
|
|
|
=cut |
143
|
|
|
|
|
|
|
|
144
|
|
|
|
|
|
|
sub create_iprange_regexp_depthfirst { ##no critic (ArgUnpacking) |
145
|
2
|
|
|
2
|
1
|
283
|
return _build_regexp(1, \@_); |
146
|
|
|
|
|
|
|
} |
147
|
|
|
|
|
|
|
sub _build_regexp { |
148
|
81
|
|
|
81
|
|
209
|
my ($depthfirst, $ipranges) = @_; |
149
|
|
|
|
|
|
|
|
150
|
|
|
|
|
|
|
# If an argument is a hash or array ref, flatten it |
151
|
|
|
|
|
|
|
# If an argument is a scalar, make it a key and give it a value of 1 |
152
|
|
|
|
|
|
|
my @map |
153
|
3
|
|
|
|
|
16
|
= map { ! ref $_ ? ( $_ => 1 ) |
|
81
|
|
|
|
|
202
|
|
154
|
5
|
|
|
|
|
35
|
: ref $_ eq 'ARRAY' ? @{$_} |
155
|
81
|
100
|
|
|
|
298
|
: %{$_} } @{$ipranges}; |
|
88
|
100
|
|
|
|
463
|
|
156
|
|
|
|
|
|
|
|
157
|
|
|
|
|
|
|
# The tree is a temporary construct. It has three possible |
158
|
|
|
|
|
|
|
# properties: 0, 1, and code. The code is the return value for a |
159
|
|
|
|
|
|
|
# match. |
160
|
81
|
|
|
|
|
172
|
my %tree; |
161
|
|
|
|
|
|
|
|
162
|
|
|
|
|
|
|
IPRANGE: |
163
|
81
|
|
|
|
|
281
|
for ( my $i = 0; $i < @map; $i += 2 ) { |
164
|
104
|
|
|
|
|
200
|
my $range = $map[ $i ]; |
165
|
104
|
|
|
|
|
186
|
my $match = $map[ $i + 1 ]; |
166
|
|
|
|
|
|
|
|
167
|
104
|
|
|
|
|
340
|
my ( $ip, $mask ) = split m/\//xms, $range; |
168
|
104
|
100
|
|
|
|
295
|
if (! defined $mask) { |
169
|
5
|
|
|
|
|
7
|
$mask = 32; ## no critic(MagicNumbers) |
170
|
|
|
|
|
|
|
} |
171
|
|
|
|
|
|
|
|
172
|
104
|
|
|
|
|
161
|
my $tree = \%tree; |
173
|
104
|
|
|
|
|
1851
|
my @bits = split m//xms, unpack 'B32', pack 'C4', split m/[.]/xms, $ip; |
174
|
|
|
|
|
|
|
|
175
|
104
|
|
|
|
|
922
|
for my $bit ( @bits[ 0 .. $mask - 1 ] ) { |
176
|
|
|
|
|
|
|
|
177
|
|
|
|
|
|
|
# If this case is hit, it means that our IP range is a subset |
178
|
|
|
|
|
|
|
# of some other range, and thus ignorable |
179
|
1913
|
100
|
100
|
|
|
6883
|
next IPRANGE if !$depthfirst && $tree->{code}; |
180
|
|
|
|
|
|
|
|
181
|
1911
|
|
100
|
|
|
7828
|
$tree->{$bit} ||= {}; # Turn a leaf into a branch, if needed |
182
|
1911
|
|
|
|
|
3191
|
$tree = $tree->{$bit}; # Follow one branch |
183
|
|
|
|
|
|
|
} |
184
|
|
|
|
|
|
|
|
185
|
|
|
|
|
|
|
# Our $tree is now a leaf node of %tree. Set its value |
186
|
|
|
|
|
|
|
# If the code is already set, it's a non-fatal error (redundant data) |
187
|
102
|
|
100
|
|
|
1073
|
$tree->{code} ||= $match; |
188
|
|
|
|
|
|
|
|
189
|
|
|
|
|
|
|
# Ignore case where $tree->{0} or $tree->{1} are set (i.e. if |
190
|
|
|
|
|
|
|
# the current range encompasses any earlier-processed ranges). |
191
|
|
|
|
|
|
|
# Those branches will be ignored in _tree2re() |
192
|
|
|
|
|
|
|
} |
193
|
|
|
|
|
|
|
|
194
|
|
|
|
|
|
|
# Recurse into the tree making it into a regexp |
195
|
81
|
100
|
|
|
|
878
|
my $re = join q{}, '^4', $depthfirst ? _tree2re_depthfirst( \%tree ) : _tree2re( \%tree ); |
196
|
|
|
|
|
|
|
|
197
|
|
|
|
|
|
|
## Performance optimization: |
198
|
|
|
|
|
|
|
|
199
|
|
|
|
|
|
|
# If we are going to use the pattern repeatedly, it's more |
200
|
|
|
|
|
|
|
# effiecient if it's already a regexp instead of a string. |
201
|
|
|
|
|
|
|
# Otherwise, it needs to be compiled in each invocation of |
202
|
|
|
|
|
|
|
# match_ip(). If the regexp is merely stored and not used then |
203
|
|
|
|
|
|
|
# this is wasted effort. |
204
|
|
|
|
|
|
|
|
205
|
1
|
|
|
1
|
|
7
|
use re 'eval'; # needed because we're interpolating into a regexp |
|
1
|
|
|
|
|
1
|
|
|
1
|
|
|
|
|
140
|
|
206
|
81
|
|
|
|
|
10736
|
$re = qr/$re/xms; |
207
|
|
|
|
|
|
|
|
208
|
81
|
|
|
|
|
746
|
return $re; |
209
|
|
|
|
|
|
|
} |
210
|
|
|
|
|
|
|
|
211
|
|
|
|
|
|
|
=item match_ip($ipaddr, $regexp) |
212
|
|
|
|
|
|
|
|
213
|
|
|
|
|
|
|
Given a single IP address as a string of the form C |
214
|
|
|
|
|
|
|
and a regular expression string (typically the output of |
215
|
|
|
|
|
|
|
create_iprange_regexp()), this function returns a specified value |
216
|
|
|
|
|
|
|
(typically C<1>) if the IP is in one of the ranges, or C if no |
217
|
|
|
|
|
|
|
ranges match. |
218
|
|
|
|
|
|
|
|
219
|
|
|
|
|
|
|
See create_ipranges_regexp() for more details about the return value |
220
|
|
|
|
|
|
|
of this function. |
221
|
|
|
|
|
|
|
|
222
|
|
|
|
|
|
|
WARNING: This function does no checking for validity of the IP address. |
223
|
|
|
|
|
|
|
|
224
|
|
|
|
|
|
|
=cut |
225
|
|
|
|
|
|
|
|
226
|
|
|
|
|
|
|
sub match_ip { |
227
|
627
|
|
|
627
|
1
|
270680
|
my ( $ip, $re ) = @_; |
228
|
|
|
|
|
|
|
|
229
|
627
|
100
|
|
|
|
4865
|
return if !$ip; |
230
|
625
|
100
|
|
|
|
1433
|
return if !$re; |
231
|
|
|
|
|
|
|
|
232
|
624
|
|
|
|
|
1319
|
local $LAST_REGEXP_CODE_RESULT = undef; |
233
|
1
|
|
|
1
|
|
6
|
use re 'eval'; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
499
|
|
234
|
624
|
|
|
|
|
16346
|
( '4' . unpack 'B32', pack 'C4', split m/[.]/xms, $ip ) =~ m/$re/xms; |
235
|
624
|
|
|
|
|
2815
|
return $LAST_REGEXP_CODE_RESULT; |
236
|
|
|
|
|
|
|
} |
237
|
|
|
|
|
|
|
|
238
|
|
|
|
|
|
|
# Helper function. This recurses to build the regular expression |
239
|
|
|
|
|
|
|
# string from a tree of IP ranges constructed by |
240
|
|
|
|
|
|
|
# create_iprange_regexp(). |
241
|
|
|
|
|
|
|
|
242
|
|
|
|
|
|
|
sub _tree2re { |
243
|
1548
|
|
|
1548
|
|
1895
|
my ( $tree ) = @_; |
244
|
|
|
|
|
|
|
|
245
|
|
|
|
|
|
|
return |
246
|
1548
|
100
|
100
|
|
|
16701
|
defined $tree->{code} ? ( "(?{'$tree->{code}'})" ) # Match |
|
|
100
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
247
|
|
|
|
|
|
|
: $tree->{0} && $tree->{1} ? ( '(?>0', _tree2re($tree->{0}), |
248
|
|
|
|
|
|
|
'|1', _tree2re($tree->{1}), ')' ) # Choice |
249
|
|
|
|
|
|
|
: $tree->{0} ? ( '0', _tree2re($tree->{0}) ) # Literal, no choice |
250
|
|
|
|
|
|
|
: $tree->{1} ? ( '1', _tree2re($tree->{1}) ) # Literal, no choice |
251
|
|
|
|
|
|
|
: die 'Internal error: failed to create a regexp from the supplied IP ranges' |
252
|
|
|
|
|
|
|
; |
253
|
|
|
|
|
|
|
} |
254
|
|
|
|
|
|
|
|
255
|
|
|
|
|
|
|
sub _tree2re_depthfirst { |
256
|
113
|
|
|
113
|
|
474
|
my ( $tree ) = @_; |
257
|
|
|
|
|
|
|
|
258
|
113
|
100
|
|
|
|
185
|
if (defined $tree->{code}) { |
259
|
11
|
100
|
100
|
|
|
130
|
return '(?>', |
|
|
100
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
260
|
|
|
|
|
|
|
$tree->{0} && $tree->{1} ? ( '(?>0', _tree2re_depthfirst($tree->{0}), |
261
|
|
|
|
|
|
|
'|1', _tree2re_depthfirst($tree->{1}), ')|' ) |
262
|
|
|
|
|
|
|
: $tree->{0} ? ( '0', _tree2re_depthfirst($tree->{0}), q{|} ) |
263
|
|
|
|
|
|
|
: $tree->{1} ? ( '1', _tree2re_depthfirst($tree->{1}), q{|} ) |
264
|
|
|
|
|
|
|
: (), |
265
|
|
|
|
|
|
|
"(?{'$tree->{code}'}))"; |
266
|
|
|
|
|
|
|
} else { |
267
|
|
|
|
|
|
|
return |
268
|
102
|
100
|
100
|
|
|
556
|
$tree->{0} && $tree->{1} ? ( '(?>0', _tree2re_depthfirst($tree->{0}), |
|
|
100
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
269
|
|
|
|
|
|
|
'|1', _tree2re_depthfirst($tree->{1}), ')' ) # Choice |
270
|
|
|
|
|
|
|
: $tree->{0} ? ( '0', _tree2re_depthfirst($tree->{0}) ) # Literal, no choice |
271
|
|
|
|
|
|
|
: $tree->{1} ? ( '1', _tree2re_depthfirst($tree->{1}) ) # Literal, no choice |
272
|
|
|
|
|
|
|
: die 'Internal error: failed to create a regexp from the supplied IP ranges' |
273
|
|
|
|
|
|
|
; |
274
|
|
|
|
|
|
|
} |
275
|
|
|
|
|
|
|
} |
276
|
|
|
|
|
|
|
|
277
|
|
|
|
|
|
|
1; |
278
|
|
|
|
|
|
|
|
279
|
|
|
|
|
|
|
__END__ |