Fix #4106: Allow moderators to IP ban subnets.
This commit is contained in:
@@ -12,8 +12,7 @@ class IpBansController < ApplicationController
|
|||||||
end
|
end
|
||||||
|
|
||||||
def index
|
def index
|
||||||
@search = IpBan.search(search_params)
|
@ip_bans = IpBan.includes(:creator).search(search_params).paginate(params[:page], :limit => params[:limit])
|
||||||
@ip_bans = @search.paginate(params[:page], :limit => params[:limit])
|
|
||||||
respond_with(@ip_bans)
|
respond_with(@ip_bans)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|||||||
@@ -1,18 +1,13 @@
|
|||||||
class IpBan < ApplicationRecord
|
class IpBan < ApplicationRecord
|
||||||
IP_ADDR_REGEX = /\A(?:[0-9]{1,3}\.){3}[0-9]{1,3}\Z/
|
|
||||||
belongs_to_creator
|
belongs_to_creator
|
||||||
validates_presence_of :reason, :ip_addr
|
validate :validate_ip_addr
|
||||||
validates_format_of :ip_addr, :with => IP_ADDR_REGEX
|
validates_presence_of :reason
|
||||||
validates_uniqueness_of :ip_addr, :if => ->(rec) {rec.ip_addr =~ IP_ADDR_REGEX}
|
validates_uniqueness_of :ip_addr
|
||||||
after_create do |rec|
|
after_create { ModAction.log("#{CurrentUser.name} created ip ban for #{ip_addr}", :ip_ban_create) }
|
||||||
ModAction.log("#{CurrentUser.name} created ip ban for #{rec.ip_addr}",:ip_ban_create)
|
after_destroy { ModAction.log("#{CurrentUser.name} deleted ip ban for #{ip_addr}", :ip_ban_delete) }
|
||||||
end
|
|
||||||
after_destroy do |rec|
|
|
||||||
ModAction.log("#{CurrentUser.name} deleted ip ban for #{rec.ip_addr}",:ip_ban_delete)
|
|
||||||
end
|
|
||||||
|
|
||||||
def self.is_banned?(ip_addr)
|
def self.is_banned?(ip_addr)
|
||||||
exists?(["ip_addr = ?", ip_addr])
|
where("ip_addr >>= ?", ip_addr).exists?
|
||||||
end
|
end
|
||||||
|
|
||||||
def self.search(params)
|
def self.search(params)
|
||||||
@@ -24,4 +19,26 @@ class IpBan < ApplicationRecord
|
|||||||
|
|
||||||
q.apply_default_order(params)
|
q.apply_default_order(params)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
def validate_ip_addr
|
||||||
|
if ip_addr.blank?
|
||||||
|
errors[:ip_addr] << "is invalid"
|
||||||
|
elsif ip_addr.ipv4? && ip_addr.prefix < 24
|
||||||
|
errors[:ip_addr] << "may not have a subnet bigger than /24"
|
||||||
|
elsif ip_addr.ipv6? && ip_addr.prefix < 64
|
||||||
|
errors[:ip_addr] << "may not have a subnet bigger than /64"
|
||||||
|
elsif ip_addr.private? || ip_addr.loopback? || ip_addr.link_local?
|
||||||
|
errors[:ip_addr] << "must be a public address"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def has_subnet?
|
||||||
|
(ip_addr.ipv4? && ip_addr.prefix < 32) || (ip_addr.ipv6? && ip_addr.prefix < 128)
|
||||||
|
end
|
||||||
|
|
||||||
|
def subnetted_ip
|
||||||
|
str = ip_addr.to_s
|
||||||
|
str += "/" + ip_addr.prefix.to_s if has_subnet?
|
||||||
|
str
|
||||||
|
end
|
||||||
end
|
end
|
||||||
|
|||||||
@@ -14,8 +14,8 @@
|
|||||||
<tbody>
|
<tbody>
|
||||||
<% @ip_bans.each do |ip_ban| %>
|
<% @ip_bans.each do |ip_ban| %>
|
||||||
<tr>
|
<tr>
|
||||||
<td><%= link_to_ip ip_ban.ip_addr %></td>
|
<td><%= link_to_ip ip_ban.subnetted_ip %></td>
|
||||||
<td><%= ip_ban.creator.name %></td>
|
<td><%= link_to_user ip_ban.creator %></td>
|
||||||
<td><%= ip_ban.reason %></td>
|
<td><%= ip_ban.reason %></td>
|
||||||
<td><%= link_to "Unban", ip_ban_path(ip_ban), :remote => true, :method => :delete, :data => {:confirm => "Do your really want to unban #{ip_ban.ip_addr}?"} %></td>
|
<td><%= link_to "Unban", ip_ban_path(ip_ban), :remote => true, :method => :delete, :data => {:confirm => "Do your really want to unban #{ip_ban.ip_addr}?"} %></td>
|
||||||
</tr>
|
</tr>
|
||||||
|
|||||||
@@ -5,8 +5,8 @@
|
|||||||
<%= error_messages_for "ip_ban" %>
|
<%= error_messages_for "ip_ban" %>
|
||||||
|
|
||||||
<%= simple_form_for(@ip_ban) do |f| %>
|
<%= simple_form_for(@ip_ban) do |f| %>
|
||||||
<%= f.input :ip_addr, :label => "IP Address", :as => :string %>
|
<%= f.input :ip_addr, label: "IP Address", as: :string, hint: "Add /24 to ban a subnet. Example: 1.2.3.4/24" %>
|
||||||
<%= f.input :reason, :input_html => {:size => "50x5"} %>
|
<%= f.input :reason %>
|
||||||
<%= f.button :submit, "Submit" %>
|
<%= f.button :submit, "Submit" %>
|
||||||
<% end %>
|
<% end %>
|
||||||
</div>
|
</div>
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
FactoryBot.define do
|
FactoryBot.define do
|
||||||
factory(:ip_ban) do
|
factory(:ip_ban) do
|
||||||
creator :factory => :user
|
creator
|
||||||
reason {FFaker::Lorem.words.join(" ")}
|
reason { FFaker::Lorem.words.join(" ") }
|
||||||
ip_addr {"127.0.0.2"}
|
ip_addr { FFaker::Internet.ip_v4_address }
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|||||||
@@ -2,10 +2,8 @@ require 'test_helper'
|
|||||||
|
|
||||||
class IpBanTest < ActiveSupport::TestCase
|
class IpBanTest < ActiveSupport::TestCase
|
||||||
setup do
|
setup do
|
||||||
@user = FactoryBot.create(:user)
|
|
||||||
CurrentUser.user = FactoryBot.create(:mod_user)
|
CurrentUser.user = FactoryBot.create(:mod_user)
|
||||||
CurrentUser.ip_addr = "127.0.0.1"
|
CurrentUser.ip_addr = "127.0.0.1"
|
||||||
Danbooru.config.stubs(:member_comment_time_threshold).returns(1.week.from_now)
|
|
||||||
end
|
end
|
||||||
|
|
||||||
teardown do
|
teardown do
|
||||||
@@ -13,24 +11,34 @@ class IpBanTest < ActiveSupport::TestCase
|
|||||||
CurrentUser.ip_addr = nil
|
CurrentUser.ip_addr = nil
|
||||||
end
|
end
|
||||||
|
|
||||||
should "be able to count the number of comments an IP address is associated with" do
|
|
||||||
comment = FactoryBot.create(:comment)
|
|
||||||
counts = IpBan.count_by_ip_addr("comments", [comment.creator_id], "creator_id", "creator_ip_addr")
|
|
||||||
assert_equal([{"creator_ip_addr" => "127.0.0.1", "count" => 1}], counts)
|
|
||||||
end
|
|
||||||
|
|
||||||
should "be able to count any updates from a user, groupiny by IP address" do
|
|
||||||
CurrentUser.scoped(@user, "1.2.3.4") do
|
|
||||||
comment = FactoryBot.create(:comment, :body => "aaa")
|
|
||||||
counts = IpBan.query([comment.creator_id])
|
|
||||||
assert_equal([{"creator_ip_addr" => "1.2.3.4", "count" => 1}], counts["comments"])
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
should "be able to ban a user" do
|
should "be able to ban a user" do
|
||||||
ip_ban = IpBan.create(ip_addr: "1.2.3.4", reason: "test")
|
ip_ban = create(:ip_ban, ip_addr: "1.2.3.4")
|
||||||
|
|
||||||
assert_equal("1.2.3.4", ip_ban.ip_addr.to_s)
|
assert_equal("1.2.3.4", ip_ban.subnetted_ip)
|
||||||
assert(IpBan.is_banned?("1.2.3.4"))
|
assert(IpBan.is_banned?("1.2.3.4"))
|
||||||
end
|
end
|
||||||
|
|
||||||
|
should "be able to ban a subnet" do
|
||||||
|
ip_ban = create(:ip_ban, ip_addr: "1.2.3.4/24")
|
||||||
|
|
||||||
|
assert_equal("1.2.3.0/24", ip_ban.subnetted_ip)
|
||||||
|
assert(IpBan.is_banned?("1.2.3.0"))
|
||||||
|
assert(IpBan.is_banned?("1.2.3.255"))
|
||||||
|
end
|
||||||
|
|
||||||
|
context "validation" do
|
||||||
|
subject { build(:ip_ban) }
|
||||||
|
|
||||||
|
should allow_value("1.2.3.4").for(:ip_addr)
|
||||||
|
should allow_value("1.2.3.4/24").for(:ip_addr)
|
||||||
|
should allow_value("ABCD::1234").for(:ip_addr)
|
||||||
|
should allow_value("ABCD::1234/64").for(:ip_addr)
|
||||||
|
|
||||||
|
should_not allow_value("").for(:ip_addr)
|
||||||
|
should_not allow_value("foo").for(:ip_addr)
|
||||||
|
should_not allow_value("10.0.0.1").for(:ip_addr)
|
||||||
|
should_not allow_value("127.0.0.1").for(:ip_addr)
|
||||||
|
should_not allow_value("1.2.3.4/16").for(:ip_addr)
|
||||||
|
should_not allow_value("ABCD::1234/32").for(:ip_addr)
|
||||||
|
end
|
||||||
end
|
end
|
||||||
|
|||||||
Reference in New Issue
Block a user