AddRestrictionModal() — supabase Function Reference
Architecture documentation for the AddRestrictionModal() function in AddRestrictionModal.tsx from the supabase codebase.
Entity Profile
Dependency Diagram
graph TD 4ff86e27_10bd_51fe_bb6f_c71cd9f5b6f7["AddRestrictionModal()"] 17caaa5c_6590_8570_26bc_5786d7e48d1a["isValidAddress()"] 4ff86e27_10bd_51fe_bb6f_c71cd9f5b6f7 -->|calls| 17caaa5c_6590_8570_26bc_5786d7e48d1a 275823bb_fd38_e088_0b7a_84342295b9d0["checkIfPrivate()"] 4ff86e27_10bd_51fe_bb6f_c71cd9f5b6f7 -->|calls| 275823bb_fd38_e088_0b7a_84342295b9d0 24a9d585_11ec_2bea_6a58_468a861991a9["normalize()"] 4ff86e27_10bd_51fe_bb6f_c71cd9f5b6f7 -->|calls| 24a9d585_11ec_2bea_6a58_468a861991a9 e5f0d869_fb76_333e_f557_c10d0de42faf["getAddressEndRange()"] 4ff86e27_10bd_51fe_bb6f_c71cd9f5b6f7 -->|calls| e5f0d869_fb76_333e_f557_c10d0de42faf style 4ff86e27_10bd_51fe_bb6f_c71cd9f5b6f7 fill:#6366f1,stroke:#818cf8,color:#fff
Relationship Graph
Source Code
apps/studio/components/interfaces/Settings/Database/NetworkRestrictions/AddRestrictionModal.tsx lines 26–257
const AddRestrictionModal = ({
type,
hasOverachingRestriction,
onClose,
}: AddRestrictionModalProps) => {
const formId = 'add-restriction-form'
const { ref } = useParams()
const { data } = useNetworkRestrictionsQuery({ projectRef: ref }, { enabled: type !== undefined })
const ipv4Restrictions = data?.config?.dbAllowedCidrs ?? []
// @ts-ignore [Joshen] API typing issue
const ipv6Restrictions = data?.config?.dbAllowedCidrsV6 ?? []
const restrictedIps = ipv4Restrictions.concat(ipv6Restrictions)
const { mutate: applyNetworkRestrictions, isPending: isApplying } =
useNetworkRestrictionsApplyMutation({
onSuccess: () => {
toast.success('Successfully added restriction')
onClose()
},
})
const validate = (values: any) => {
const errors: any = {}
if (type === undefined) return errors
const { ipAddress, cidrBlockSize } = values
// Validate CIDR block size
const isOutOfCidrSizeRange =
type === 'IPv4'
? cidrBlockSize < 0 || cidrBlockSize > IPV4_MAX_CIDR_BLOCK_SIZE
: cidrBlockSize < 0 || cidrBlockSize > IPV6_MAX_CIDR_BLOCK_SIZE
if (cidrBlockSize.length === 0 || isOutOfCidrSizeRange) {
errors.cidrBlockSize = `Size has to be between 0 to ${
type === 'IPv4' ? IPV4_MAX_CIDR_BLOCK_SIZE : IPV6_MAX_CIDR_BLOCK_SIZE
}`
}
// Validate IP address
const isValid = isValidAddress(ipAddress)
if (!isValid) {
errors.ipAddress = 'Please enter a valid IP address'
return errors
}
try {
const isPrivate = checkIfPrivate(type, ipAddress)
if (isPrivate) errors.ipAddress = 'Private IP addresses are not supported'
} catch (error: any) {
errors.ipAddress = error.message
}
return errors
}
const onSubmit = async (values: any) => {
if (!ref) return console.error('Project ref is required')
const address = `${values.ipAddress}/${values.cidrBlockSize}`
const normalizedAddress = normalize(address)
const alreadyExists =
restrictedIps.includes(address) || restrictedIps.includes(normalizedAddress)
if (alreadyExists) {
return toast(`The address ${address} is already restricted`)
}
// Need to replace over arching restriction (allow all / disallow all)
if (hasOverachingRestriction) {
const dbAllowedCidrs = type === 'IPv4' ? [normalizedAddress] : []
const dbAllowedCidrsV6 = type === 'IPv6' ? [normalizedAddress] : []
applyNetworkRestrictions({ projectRef: ref, dbAllowedCidrs, dbAllowedCidrsV6 })
} else {
const dbAllowedCidrs =
type === 'IPv4' ? [...ipv4Restrictions, normalizedAddress] : ipv4Restrictions
const dbAllowedCidrsV6 =
type === 'IPv6' ? [...ipv6Restrictions, normalizedAddress] : ipv6Restrictions
applyNetworkRestrictions({ projectRef: ref, dbAllowedCidrs, dbAllowedCidrsV6 })
}
}
return (
<Modal
hideFooter
size="medium"
visible={type !== undefined}
onCancel={onClose}
header={`Add a new ${type} restriction`}
>
<Form
validateOnBlur
id={formId}
className="!border-t-0"
initialValues={{
ipAddress: '',
cidrBlockSize:
type === 'IPv4'
? IPV4_MAX_CIDR_BLOCK_SIZE.toString()
: IPV6_MAX_CIDR_BLOCK_SIZE.toString(),
}}
validate={validate}
onSubmit={onSubmit}
>
{({ values }: any) => {
const isPrivate =
type !== undefined && isValidAddress(values.ipAddress)
? checkIfPrivate(type, values.ipAddress)
: false
const isValidBlockSize =
values.cidrBlockSize !== '' &&
((type === 'IPv4' &&
values.cidrBlockSize >= 0 &&
values.cidrBlockSize <= IPV4_MAX_CIDR_BLOCK_SIZE) ||
(type === 'IPv6' &&
values.cidrBlockSize >= 0 &&
values.cidrBlockSize <= IPV6_MAX_CIDR_BLOCK_SIZE))
const availableAddresses =
type === 'IPv4'
? Math.pow(2, IPV4_MAX_CIDR_BLOCK_SIZE - (values?.cidrBlockSize ?? 0))
: Math.pow(2, IPV6_MAX_CIDR_BLOCK_SIZE - (values?.cidrBlockSize ?? 0))
const addressRange =
type !== undefined
? getAddressEndRange(type, `${values.ipAddress}/${values.cidrBlockSize}`)
: undefined
const isValidCIDR = isValidBlockSize && !isPrivate && addressRange !== undefined
const normalizedAddress = isValidCIDR
? normalize(`${values.ipAddress}/${values.cidrBlockSize}`)
: `${values.ipAddress}/${values.cidrBlockSize}`
return (
<>
<Modal.Content className="space-y-4">
<p className="text-sm text-foreground-light">
This will add an IP address range to a list of allowed ranges that can access your
database.
</p>
<InformationBox
title="Note: Restrictions only apply to direct connections to your database and connection pooler"
description="They do not currently apply to APIs offered over HTTPS, such as PostgREST, Storage, or Authentication."
urlLabel="Learn more"
url={`${DOCS_URL}/guides/platform/network-restrictions#limitations`}
/>
<div className="flex space-x-4">
<div className="w-[55%]">
<Input
label={`${type} address`}
id="ipAddress"
name="ipAddress"
placeholder={type === 'IPv4' ? '0.0.0.0' : '::0'}
/>
</div>
<div className="flex-grow">
<Input
label={
<div className="flex items-center space-x-2">
<p>CIDR Block Size</p>
<Tooltip>
<TooltipTrigger>
<HelpCircle size="14" strokeWidth={2} />
</TooltipTrigger>
<TooltipContent side="bottom" className="w-80">
Classless inter-domain routing (CIDR) notation is the notation used to
identify networks and hosts in the networks. The block size tells us
how many bits we need to take for the network prefix, and is a value
between 0 to{' '}
{type === 'IPv4'
? IPV4_MAX_CIDR_BLOCK_SIZE
: IPV6_MAX_CIDR_BLOCK_SIZE}
.
</TooltipContent>
</Tooltip>
</div>
}
id="cidrBlockSize"
name="cidrBlockSize"
type="number"
placeholder={
type === 'IPv4'
? IPV4_MAX_CIDR_BLOCK_SIZE.toString()
: IPV6_MAX_CIDR_BLOCK_SIZE.toString()
}
min={0}
max={type === 'IPv4' ? IPV4_MAX_CIDR_BLOCK_SIZE : IPV6_MAX_CIDR_BLOCK_SIZE}
/>
</div>
</div>
</Modal.Content>
<Modal.Separator />
{isValidCIDR ? (
<Modal.Content className="space-y-1">
<p className="text-sm">
The address range <code className="text-code-inline">{normalizedAddress}</code>{' '}
will be restricted
</p>
<p className="text-sm text-foreground-light">
Selected address space:{' '}
<code className="text-code-inline">{addressRange.start}</code> to{' '}
<code className="text-code-inline">{addressRange.end}</code>{' '}
</p>
<p className="text-sm text-foreground-light">
Number of addresses: {availableAddresses}
</p>
</Modal.Content>
) : (
<Modal.Content>
<div className="h-[68px] flex items-center">
<p className="text-sm text-foreground-light">
A summary of your restriction will be shown here after entering a valid IP
address and CIDR block size. IP addresses will also be normalized.
</p>
</div>
</Modal.Content>
)}
<Modal.Separator />
<Modal.Content className="flex items-center justify-end space-x-2">
<Button type="default" disabled={isApplying} onClick={() => onClose()}>
Cancel
</Button>
<Button htmlType="submit" loading={isApplying} disabled={isApplying}>
Save restriction
</Button>
</Modal.Content>
</>
)
}}
</Form>
</Modal>
)
}
Domain
Subdomains
Source
Frequently Asked Questions
What does AddRestrictionModal() do?
AddRestrictionModal() is a function in the supabase codebase.
What does AddRestrictionModal() call?
AddRestrictionModal() calls 4 function(s): checkIfPrivate, getAddressEndRange, isValidAddress, normalize.
Analyze Your Own Codebase
Get architecture documentation, dependency graphs, and domain analysis for your codebase in minutes.
Try Supermodel Free