2019-05-03 06:17:27 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2014-11-17 19:04:29 +08:00
|
|
|
class SpamHandler
|
|
|
|
|
|
|
|
def self.should_prevent_registration_from_ip?(ip_address)
|
|
|
|
return false if SiteSetting.max_new_accounts_per_registration_ip <= 0
|
|
|
|
|
2014-11-17 22:02:10 +08:00
|
|
|
tl2_plus_accounts_with_same_ip = User.where("trust_level >= ?", TrustLevel[2])
|
2014-11-22 01:16:06 +08:00
|
|
|
.where(ip_address: ip_address.to_s)
|
2014-11-17 22:02:10 +08:00
|
|
|
.count
|
|
|
|
|
|
|
|
return false if tl2_plus_accounts_with_same_ip > 0
|
|
|
|
|
2020-04-27 13:01:43 +08:00
|
|
|
staff_members_with_same_ip = Group[:staff].users.human_users
|
2014-11-22 01:16:06 +08:00
|
|
|
.where(ip_address: ip_address.to_s)
|
2014-11-21 07:25:44 +08:00
|
|
|
.count
|
|
|
|
|
|
|
|
return false if staff_members_with_same_ip > 0
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
allowed_ip = ScreenedIpAddress.is_allowed?(ip_address)
|
|
|
|
return false if allowed_ip
|
2015-06-02 17:36:45 +08:00
|
|
|
|
2014-11-17 19:04:29 +08:00
|
|
|
tl0_accounts_with_same_ip = User.unscoped
|
|
|
|
.where(trust_level: TrustLevel[0])
|
2014-11-22 01:16:06 +08:00
|
|
|
.where(ip_address: ip_address.to_s)
|
2014-11-17 19:04:29 +08:00
|
|
|
.count
|
|
|
|
|
|
|
|
tl0_accounts_with_same_ip >= SiteSetting.max_new_accounts_per_registration_ip
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|