2019-05-03 06:17:27 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2014-11-17 19:04:29 +08:00
|
|
|
class SpamHandler
|
|
|
|
def self.should_prevent_registration_from_ip?(ip_address)
|
|
|
|
return false if SiteSetting.max_new_accounts_per_registration_ip <= 0
|
|
|
|
|
2014-11-17 22:02:10 +08:00
|
|
|
tl2_plus_accounts_with_same_ip =
|
|
|
|
User.where("trust_level >= ?", TrustLevel[2]).where(ip_address: ip_address.to_s).count
|
|
|
|
|
|
|
|
return false if tl2_plus_accounts_with_same_ip > 0
|
|
|
|
|
2020-04-27 13:01:43 +08:00
|
|
|
staff_members_with_same_ip =
|
2014-11-22 01:16:06 +08:00
|
|
|
Group[:staff].users.human_users.where(ip_address: ip_address.to_s).count
|
2014-11-21 07:25:44 +08:00
|
|
|
|
|
|
|
return false if staff_members_with_same_ip > 0
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
allowed_ip = ScreenedIpAddress.is_allowed?(ip_address)
|
|
|
|
return false if allowed_ip
|
2015-06-02 17:36:45 +08:00
|
|
|
|
2014-11-17 19:04:29 +08:00
|
|
|
tl0_accounts_with_same_ip =
|
2014-11-22 01:16:06 +08:00
|
|
|
User.unscoped.where(trust_level: TrustLevel[0]).where(ip_address: ip_address.to_s).count
|
2014-11-17 19:04:29 +08:00
|
|
|
|
|
|
|
tl0_accounts_with_same_ip >= SiteSetting.max_new_accounts_per_registration_ip
|
|
|
|
end
|
|
|
|
end
|