|
da21fad10b
|
SECURITY: Possible SQL injection.
|
2016-07-18 15:35:41 +08:00 |
|
|
5ca26a7707
|
FEATURE: add site setting use_admin_ip_whitelist to enable/disable the whitelisting of admins by IP address
|
2015-09-23 12:15:08 -04:00 |
|
|
fc962eb378
|
FEATURE: automatic daily roll-up for screened IP addresses
|
2015-03-09 18:55:17 +01:00 |
|
|
7c14db44cc
|
UX: improve message when admin login is blocked because of admin ip address whitelisting
|
2015-03-02 12:13:22 -05:00 |
|
|
c4e427cf73
|
FEATURE: filter screened IP addresses
|
2015-02-10 19:38:59 +01:00 |
|
|
0398ab7514
|
FIX: when adding an IP to the spammer list, check the broader ban list
first
FEATURE: allow admins to search users using IP ranges
|
2014-11-21 18:16:06 +01:00 |
|
|
d96acdeafa
|
FEATURE: screened IP address range can be entered like 192.* instead of 192.*.*.*
|
2014-09-24 12:05:29 -04:00 |
|
|
ca5f361d0a
|
FEATURE: restrict admin access based on IP address
|
2014-09-05 12:06:01 -04:00 |
|
|
414c6d191f
|
FIX: remove nullable dates post upgrade to Rails 4
|
2014-08-27 15:19:25 +10:00 |
|
|
7ef61144e7
|
Avoid using to_s when performing String Interpolation
|
2014-08-14 23:55:27 +05:30 |
|
|
b1d5f4440b
|
Annotate models
|
2014-05-28 12:30:57 +10:00 |
|
|
1574485443
|
Perform the where(...).first to find_by(...) refactoring.
This refactoring was automated using the command: bundle exec "ruby refactorings/where_dot_first_to_find_by/app.rb"
|
2014-05-06 14:41:59 +01:00 |
|
|
862a6696c0
|
Correct annotations
allow longer usernames (up to 60)
|
2014-04-15 15:53:48 +10:00 |
|
|
6373de550f
|
update annotations
|
2014-04-08 17:35:44 +02:00 |
|
|
5fd390c600
|
FIX: nuke spammer from flags page
|
2014-02-21 14:14:30 -05:00 |
|
|
d0ecccb7e4
|
Translate asterisks in ip addresses to mask format so people can enter things like 127.*.*.* in screened ip addresses form
|
2014-02-18 13:00:55 -05:00 |
|
|
6c23a1903e
|
FIX: show ip address with mask again on /admin/logs/screened_ip_addresses
|
2014-02-18 10:33:08 -05:00 |
|
|
2db3cfb16b
|
annotate models
|
2013-12-05 17:40:35 +11:00 |
|
|
1b19444b44
|
URGENT FIX: code would fail in Ruby 1.9.3 exception does not exist
|
2013-11-18 09:32:02 +11:00 |
|
|
8724b2e2b6
|
Add comments about the IPAddr hack
|
2013-11-05 11:24:13 -05:00 |
|
|
1e21fc8c9a
|
fix regression in Rails 4
|
2013-11-05 10:32:35 +11:00 |
|
|
8aab2253d0
|
Whitelisted ip addresses will not be flagged as spam by flag_sockpuppets
|
2013-10-23 17:11:35 -04:00 |
|
|
c1008f4359
|
Fixes for postgresql inet columns in Rails 4. They're backed by an IPAddr class now, which breaks sql parameter marker support, and automatically sets the attribute to nil when trying to assign an invalid ip address.
|
2013-10-22 19:19:32 -04:00 |
|
|
7d582fbee3
|
Screened ip address can be edited, deleted, and changed to allow or block.
|
2013-10-22 16:30:46 -04:00 |
|
|
648b11a0eb
|
Add screening by IP address. When deleting a user as a spammer, block all signups from the same IP address.
|
2013-10-21 14:50:18 -04:00 |
|