2019-05-02 18:17:27 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2014-11-17 06:04:29 -05:00
|
|
|
class SpamHandler
|
|
|
|
def self.should_prevent_registration_from_ip?(ip_address)
|
|
|
|
return false if SiteSetting.max_new_accounts_per_registration_ip <= 0
|
|
|
|
|
2014-11-17 09:02:10 -05:00
|
|
|
tl2_plus_accounts_with_same_ip =
|
|
|
|
User.where("trust_level >= ?", TrustLevel[2]).where(ip_address: ip_address.to_s).count
|
|
|
|
|
|
|
|
return false if tl2_plus_accounts_with_same_ip > 0
|
|
|
|
|
2020-04-27 01:01:43 -04:00
|
|
|
staff_members_with_same_ip =
|
2014-11-21 12:16:06 -05:00
|
|
|
Group[:staff].users.human_users.where(ip_address: ip_address.to_s).count
|
2014-11-20 18:25:44 -05:00
|
|
|
|
|
|
|
return false if staff_members_with_same_ip > 0
|
|
|
|
|
2020-07-26 20:23:54 -04:00
|
|
|
allowed_ip = ScreenedIpAddress.is_allowed?(ip_address)
|
|
|
|
return false if allowed_ip
|
2015-06-02 05:36:45 -04:00
|
|
|
|
2014-11-17 06:04:29 -05:00
|
|
|
tl0_accounts_with_same_ip =
|
2014-11-21 12:16:06 -05:00
|
|
|
User.unscoped.where(trust_level: TrustLevel[0]).where(ip_address: ip_address.to_s).count
|
2014-11-17 06:04:29 -05:00
|
|
|
|
|
|
|
tl0_accounts_with_same_ip >= SiteSetting.max_new_accounts_per_registration_ip
|
|
|
|
end
|
|
|
|
end
|