class ActionDispatch::RemoteIp::RemoteIpGetter

def to_s

def to_s
  return remote_addrs.first if remote_addrs.any?
  forwarded_ips = @env['HTTP_X_FORWARDED_FOR'] ? @env['HTTP_X_FORWARDED_FOR'].strip.split(/[,\s]+/) : []
  if client_ip = @env['HTTP_CLIENT_IP']
    if @check_ip_spoofing && !forwarded_ips.include?(client_ip)
      # We don't know which came from the proxy, and which from the user
      raise IpSpoofAttackError, "IP spoofing attack?!" \
        "HTTP_CLIENT_IP=#{@env['HTTP_CLIENT_IP'].inspect}" \
        "HTTP_X_FORWARDED_FOR=#{@env['HTTP_X_FORWARDED_FOR'].inspect}"
    end
    return client_ip
  end
  return forwarded_ips.reject { |ip| ip =~ @trusted_proxies }.last || @env["REMOTE_ADDR"]
end