Add a polymorphic `subject` field that records the subject of the mod action. The subject is the post, user, comment, artist, etc the mod action is for. * The subject for the user ban and unban actions is the user, not the ban itself. * The subject for the user feedback update and deletion actions is the user, not the feedback itself. * The subject for the post undeletion action is the post, not the approval itself. * The subject for the move favorites action is the source post where the favorites were moved from, not the destination post where the favorites were moved to. * The subject for the post permanent delete action is nil, because the post itself is hard deleted. * When a post is permanently deleted, all mod actions related to the post are deleted as well.
87 lines
2.6 KiB
Ruby
87 lines
2.6 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
class IpBan < ApplicationRecord
|
|
attribute :ip_addr, :ip_address
|
|
|
|
belongs_to :creator, class_name: "User"
|
|
has_many :mod_actions, as: :subject, dependent: :destroy
|
|
|
|
validate :validate_ip_addr
|
|
validates :reason, presence: true
|
|
|
|
after_save :create_mod_action
|
|
|
|
deletable
|
|
enum category: {
|
|
full: 0,
|
|
partial: 100,
|
|
}, _suffix: "ban"
|
|
|
|
def self.visible(user)
|
|
if user.is_moderator?
|
|
all
|
|
else
|
|
none
|
|
end
|
|
end
|
|
|
|
def self.ip_matches(ip_addr)
|
|
where("ip_addr >>= ?", ip_addr.to_s)
|
|
end
|
|
|
|
def self.hit!(category, ip_addr)
|
|
ip_ban = active.where(category: category).ip_matches(ip_addr).first
|
|
return false unless ip_ban
|
|
|
|
IpBan.increment_counter(:hit_count, ip_ban.id, touch: [:last_hit_at])
|
|
true
|
|
end
|
|
|
|
def self.search(params, current_user)
|
|
q = search_attributes(params, [:id, :created_at, :updated_at, :ip_addr, :reason, :is_deleted, :category, :hit_count, :last_hit_at, :creator], current_user: current_user)
|
|
|
|
case params[:order]
|
|
when /\A(created_at|updated_at|last_hit_at)(?:_(asc|desc))?\z/i
|
|
column = $1
|
|
dir = $2 || :desc
|
|
q = q.order(Arel.sql("#{column} #{dir} NULLS LAST")).order(id: :desc)
|
|
else
|
|
q = q.apply_default_order(params)
|
|
end
|
|
|
|
q
|
|
end
|
|
|
|
def create_mod_action
|
|
if previously_new_record?
|
|
ModAction.log("created ip ban for #{ip_addr}", :ip_ban_create, subject: self, user: creator)
|
|
elsif is_deleted? == true && is_deleted_before_last_save == false
|
|
ModAction.log("deleted ip ban for #{ip_addr}", :ip_ban_delete, subject: self, user: CurrentUser.user)
|
|
elsif is_deleted? == false && is_deleted_before_last_save == true
|
|
ModAction.log("undeleted ip ban for #{ip_addr}", :ip_ban_undelete, subject: self, user: CurrentUser.user)
|
|
end
|
|
end
|
|
|
|
def validate_ip_addr
|
|
if ip_addr.blank?
|
|
errors.add(:ip_addr, "is invalid")
|
|
elsif ip_addr.is_local?
|
|
errors.add(:ip_addr, "must be a public address")
|
|
elsif full_ban? && ip_addr.ipv4? && ip_addr.prefix < 24
|
|
errors.add(:ip_addr, "may not have a subnet bigger than /24")
|
|
elsif partial_ban? && ip_addr.ipv4? && ip_addr.prefix < 8
|
|
errors.add(:ip_addr, "may not have a subnet bigger than /8")
|
|
elsif full_ban? && ip_addr.ipv6? && ip_addr.prefix < 48
|
|
errors.add(:ip_addr, "may not have a subnet bigger than /48")
|
|
elsif partial_ban? && ip_addr.ipv6? && ip_addr.prefix < 20
|
|
errors.add(:ip_addr, "may not have a subnet bigger than /20")
|
|
elsif new_record? && IpBan.active.where(category: category).ip_matches(ip_addr).exists?
|
|
errors.add(:ip_addr, "is already banned")
|
|
end
|
|
end
|
|
|
|
def self.available_includes
|
|
[:creator]
|
|
end
|
|
end
|