Skip to content

Commit

Permalink
Add ability to block sign-ups from IP (mastodon#19037)
Browse files Browse the repository at this point in the history
  • Loading branch information
Gargron authored and kadoshita committed Nov 19, 2022
1 parent 31bc1ce commit 10dcf23
Show file tree
Hide file tree
Showing 5 changed files with 64 additions and 13 deletions.
6 changes: 5 additions & 1 deletion app/controllers/auth/registrations_controller.rb
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,7 @@ def after_update_path_for(_resource)
end

def check_enabled_registrations
redirect_to root_path if single_user_mode? || omniauth_only? || !allowed_registrations?
redirect_to root_path if single_user_mode? || omniauth_only? || !allowed_registrations? || ip_blocked?
end

def allowed_registrations?
Expand All @@ -93,6 +93,10 @@ def omniauth_only?
ENV['OMNIAUTH_ONLY'] == 'true'
end

def ip_blocked?
IpBlock.where(severity: :sign_up_block).where('ip >>= ?', request.remote_ip.to_s).exists?
end

def invite_code
if params[:user]
params[:user][:invite_code]
Expand Down
1 change: 1 addition & 0 deletions app/models/ip_block.rb
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ class IpBlock < ApplicationRecord

enum severity: {
sign_up_requires_approval: 5000,
sign_up_block: 5500,
no_access: 9999,
}

Expand Down
66 changes: 55 additions & 11 deletions app/services/app_sign_up_service.rb
Original file line number Diff line number Diff line change
Expand Up @@ -2,23 +2,67 @@

class AppSignUpService < BaseService
def call(app, remote_ip, params)
return unless allowed_registrations?
@app = app
@remote_ip = remote_ip
@params = params

user_params = params.slice(:email, :password, :agreement, :locale)
account_params = params.slice(:username)
invite_request_params = { text: params[:reason] }
user = User.create!(user_params.merge(created_by_application: app, sign_up_ip: remote_ip, password_confirmation: user_params[:password], account_attributes: account_params, invite_request_attributes: invite_request_params))
raise Mastodon::NotPermittedError unless allowed_registrations?

Doorkeeper::AccessToken.create!(application: app,
resource_owner_id: user.id,
scopes: app.scopes,
expires_in: Doorkeeper.configuration.access_token_expires_in,
use_refresh_token: Doorkeeper.configuration.refresh_token_enabled?)
ApplicationRecord.transaction do
create_user!
create_access_token!
end

@access_token
end

private

def create_user!
@user = User.create!(
user_params.merge(created_by_application: @app, sign_up_ip: @remote_ip, password_confirmation: user_params[:password], account_attributes: account_params, invite_request_attributes: invite_request_params)
)
end

def create_access_token!
@access_token = Doorkeeper::AccessToken.create!(
application: @app,
resource_owner_id: @user.id,
scopes: @app.scopes,
expires_in: Doorkeeper.configuration.access_token_expires_in,
use_refresh_token: Doorkeeper.configuration.refresh_token_enabled?
)
end

def user_params
@params.slice(:email, :password, :agreement, :locale)
end

def account_params
@params.slice(:username)
end

def invite_request_params
{ text: @params[:reason] }
end

def allowed_registrations?
Setting.registrations_mode != 'none' && !Rails.configuration.x.single_user_mode
registrations_open? && !single_user_mode? && !omniauth_only? && !ip_blocked?
end

def registrations_open?
Setting.registrations_mode != 'none'
end

def single_user_mode?
Rails.configuration.x.single_user_mode
end

def omniauth_only?
ENV['OMNIAUTH_ONLY'] == 'true'
end

def ip_blocked?
IpBlock.where(severity: :sign_up_block).where('ip >>= ?', @remote_ip.to_s).exists?
end
end
2 changes: 2 additions & 0 deletions config/locales/simple_form.en.yml
Original file line number Diff line number Diff line change
Expand Up @@ -85,6 +85,7 @@ en:
ip: Enter an IPv4 or IPv6 address. You can block entire ranges using the CIDR syntax. Be careful not to lock yourself out!
severities:
no_access: Block access to all resources
sign_up_block: New sign-ups will not be possible
sign_up_requires_approval: New sign-ups will require your approval
severity: Choose what will happen with requests from this IP
rule:
Expand Down Expand Up @@ -219,6 +220,7 @@ en:
ip: IP
severities:
no_access: Block access
sign_up_block: Block sign-ups
sign_up_requires_approval: Limit sign-ups
severity: Rule
notification_emails:
Expand Down
2 changes: 1 addition & 1 deletion spec/services/app_sign_up_service_spec.rb
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@
it 'returns nil when registrations are closed' do
tmp = Setting.registrations_mode
Setting.registrations_mode = 'none'
expect(subject.call(app, remote_ip, good_params)).to be_nil
expect { subject.call(app, remote_ip, good_params) }.to raise_error Mastodon::NotPermittedError
Setting.registrations_mode = tmp
end

Expand Down

0 comments on commit 10dcf23

Please sign in to comment.