* Add automatic blocklist display in /about/blocks Inspired by https://github.com/Gargron/mastodon.social-misc * Add admin option to set who can see instance blocks * Normalize locales files * Rename “Sandbox” to “Silence” for consistency * Disable /about/blocks when in whitelist mode * Optionally display rationale for domain blocks * Only display domain blocks that have user-facing limitations, and order them * Redesign table of blocked domains to better handle long domain names and rationales * Change domain blocks ordering now that rationales aren't displayed right away * Only show explanation for block severities actually in use * Reword instance block explanations and add disclaimer for public fetch mode
		
			
				
	
	
		
			73 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
			
		
		
	
	
			73 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
# frozen_string_literal: true
 | 
						|
# == Schema Information
 | 
						|
#
 | 
						|
# Table name: domain_blocks
 | 
						|
#
 | 
						|
#  id              :bigint(8)        not null, primary key
 | 
						|
#  domain          :string           default(""), not null
 | 
						|
#  created_at      :datetime         not null
 | 
						|
#  updated_at      :datetime         not null
 | 
						|
#  severity        :integer          default("silence")
 | 
						|
#  reject_media    :boolean          default(FALSE), not null
 | 
						|
#  reject_reports  :boolean          default(FALSE), not null
 | 
						|
#  private_comment :text
 | 
						|
#  public_comment  :text
 | 
						|
#
 | 
						|
 | 
						|
class DomainBlock < ApplicationRecord
 | 
						|
  include DomainNormalizable
 | 
						|
 | 
						|
  enum severity: [:silence, :suspend, :noop]
 | 
						|
 | 
						|
  validates :domain, presence: true, uniqueness: true, domain: true
 | 
						|
 | 
						|
  has_many :accounts, foreign_key: :domain, primary_key: :domain
 | 
						|
  delegate :count, to: :accounts, prefix: true
 | 
						|
 | 
						|
  scope :matches_domain, ->(value) { where(arel_table[:domain].matches("%#{value}%")) }
 | 
						|
  scope :with_user_facing_limitations, -> { where(severity: [:silence, :suspend]).or(where(reject_media: true)) }
 | 
						|
 | 
						|
  class << self
 | 
						|
    def suspend?(domain)
 | 
						|
      !!rule_for(domain)&.suspend?
 | 
						|
    end
 | 
						|
 | 
						|
    def silence?(domain)
 | 
						|
      !!rule_for(domain)&.silence?
 | 
						|
    end
 | 
						|
 | 
						|
    def reject_media?(domain)
 | 
						|
      !!rule_for(domain)&.reject_media?
 | 
						|
    end
 | 
						|
 | 
						|
    def reject_reports?(domain)
 | 
						|
      !!rule_for(domain)&.reject_reports?
 | 
						|
    end
 | 
						|
 | 
						|
    alias blocked? suspend?
 | 
						|
 | 
						|
    def rule_for(domain)
 | 
						|
      return if domain.blank?
 | 
						|
 | 
						|
      uri      = Addressable::URI.new.tap { |u| u.host = domain.gsub(/[\/]/, '') }
 | 
						|
      segments = uri.normalized_host.split('.')
 | 
						|
      variants = segments.map.with_index { |_, i| segments[i..-1].join('.') }
 | 
						|
 | 
						|
      where(domain: variants[0..-2]).order(Arel.sql('char_length(domain) desc')).first
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  def stricter_than?(other_block)
 | 
						|
    return true  if suspend?
 | 
						|
    return false if other_block.suspend? && (silence? || noop?)
 | 
						|
    return false if other_block.silence? && noop?
 | 
						|
 | 
						|
    (reject_media || !other_block.reject_media) && (reject_reports || !other_block.reject_reports)
 | 
						|
  end
 | 
						|
 | 
						|
  def affected_accounts_count
 | 
						|
    scope = suspend? ? accounts.where(suspended_at: created_at) : accounts.where(silenced_at: created_at)
 | 
						|
    scope.count
 | 
						|
  end
 | 
						|
end
 |