1
0
Fork 0
peertube/server/helpers/signup.ts

63 lines
2 KiB
TypeScript
Raw Normal View History

2021-05-11 05:15:29 -04:00
import { UserModel } from '../models/user/user'
2018-08-14 09:28:30 -04:00
import * as ipaddr from 'ipaddr.js'
2019-04-11 05:33:44 -04:00
import { CONFIG } from '../initializers/config'
2018-08-14 09:28:30 -04:00
const isCidr = require('is-cidr')
2019-10-25 07:54:32 -04:00
async function isSignupAllowed (): Promise<{ allowed: boolean, errorMessage?: string }> {
2018-08-14 09:28:30 -04:00
if (CONFIG.SIGNUP.ENABLED === false) {
2019-10-25 07:54:32 -04:00
return { allowed: false }
2018-08-14 09:28:30 -04:00
}
// No limit and signup is enabled
if (CONFIG.SIGNUP.LIMIT === -1) {
2019-10-25 07:54:32 -04:00
return { allowed: true }
2018-08-14 09:28:30 -04:00
}
const totalUsers = await UserModel.countTotal()
2019-10-25 07:54:32 -04:00
return { allowed: totalUsers < CONFIG.SIGNUP.LIMIT }
2018-08-14 09:28:30 -04:00
}
function isSignupAllowedForCurrentIP (ip: string) {
2021-04-09 08:51:28 -04:00
if (!ip) return false
2018-08-14 09:28:30 -04:00
const addr = ipaddr.parse(ip)
2020-01-31 10:56:52 -05:00
const excludeList = [ 'blacklist' ]
2018-08-14 09:28:30 -04:00
let matched = ''
// if there is a valid, non-empty whitelist, we exclude all unknown adresses too
if (CONFIG.SIGNUP.FILTERS.CIDR.WHITELIST.filter(cidr => isCidr(cidr)).length > 0) {
excludeList.push('unknown')
}
if (addr.kind() === 'ipv4') {
const addrV4 = ipaddr.IPv4.parse(ip)
const rangeList = {
whitelist: CONFIG.SIGNUP.FILTERS.CIDR.WHITELIST.filter(cidr => isCidr.v4(cidr))
.map(cidr => ipaddr.IPv4.parseCIDR(cidr)),
blacklist: CONFIG.SIGNUP.FILTERS.CIDR.BLACKLIST.filter(cidr => isCidr.v4(cidr))
.map(cidr => ipaddr.IPv4.parseCIDR(cidr))
}
matched = ipaddr.subnetMatch(addrV4, rangeList, 'unknown')
} else if (addr.kind() === 'ipv6') {
const addrV6 = ipaddr.IPv6.parse(ip)
const rangeList = {
whitelist: CONFIG.SIGNUP.FILTERS.CIDR.WHITELIST.filter(cidr => isCidr.v6(cidr))
.map(cidr => ipaddr.IPv6.parseCIDR(cidr)),
blacklist: CONFIG.SIGNUP.FILTERS.CIDR.BLACKLIST.filter(cidr => isCidr.v6(cidr))
.map(cidr => ipaddr.IPv6.parseCIDR(cidr))
}
matched = ipaddr.subnetMatch(addrV6, rangeList, 'unknown')
}
return !excludeList.includes(matched)
}
// ---------------------------------------------------------------------------
export {
isSignupAllowed,
isSignupAllowedForCurrentIP
}