2016-11-16 02:56:29 +11:00
|
|
|
# frozen_string_literal: true
|
2023-02-20 16:58:28 +11:00
|
|
|
|
2017-05-02 10:14:47 +10:00
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: domain_blocks
|
|
|
|
#
|
2019-08-08 04:20:23 +10:00
|
|
|
# id :bigint(8) not null, primary key
|
|
|
|
# domain :string default(""), not null
|
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
|
|
|
# severity :integer default("silence")
|
|
|
|
# reject_media :boolean default(FALSE), not null
|
|
|
|
# reject_reports :boolean default(FALSE), not null
|
|
|
|
# private_comment :text
|
|
|
|
# public_comment :text
|
2020-12-18 18:30:41 +11:00
|
|
|
# obfuscate :boolean default(FALSE), not null
|
2017-05-02 10:14:47 +10:00
|
|
|
#
|
2016-11-16 02:56:29 +11:00
|
|
|
|
2016-10-09 23:48:43 +11:00
|
|
|
class DomainBlock < ApplicationRecord
|
2022-06-02 01:31:36 +10:00
|
|
|
include Paginable
|
2018-12-26 16:38:42 +11:00
|
|
|
include DomainNormalizable
|
2020-12-14 19:06:34 +11:00
|
|
|
include DomainMaterializable
|
2018-12-26 16:38:42 +11:00
|
|
|
|
2024-02-17 01:54:23 +11:00
|
|
|
enum :severity, { silence: 0, suspend: 1, noop: 2 }
|
2017-01-24 03:38:38 +11:00
|
|
|
|
2019-08-09 07:04:19 +10:00
|
|
|
validates :domain, presence: true, uniqueness: true, domain: true
|
2016-10-09 23:48:43 +11:00
|
|
|
|
2023-12-02 02:52:47 +11:00
|
|
|
has_many :accounts, foreign_key: :domain, primary_key: :domain, inverse_of: false, dependent: nil
|
2017-04-17 03:37:01 +10:00
|
|
|
delegate :count, to: :accounts, prefix: true
|
|
|
|
|
2022-10-13 23:42:37 +11:00
|
|
|
scope :with_user_facing_limitations, -> { where(severity: [:silence, :suspend]) }
|
2022-11-17 21:05:09 +11:00
|
|
|
scope :with_limitations, -> { where(severity: [:silence, :suspend]).or(where(reject_media: true)) }
|
2024-01-08 22:15:36 +11:00
|
|
|
scope :by_severity, -> { in_order_of(:severity, %w(noop silence suspend)).order(:domain) }
|
2019-02-19 00:59:19 +11:00
|
|
|
|
2022-08-26 04:39:40 +10:00
|
|
|
def to_log_human_identifier
|
|
|
|
domain
|
|
|
|
end
|
|
|
|
|
2022-03-09 18:52:32 +11:00
|
|
|
def policies
|
|
|
|
if suspend?
|
2022-03-10 14:10:20 +11:00
|
|
|
[:suspend]
|
2022-03-09 18:52:32 +11:00
|
|
|
else
|
|
|
|
[severity.to_sym, reject_media? ? :reject_media : nil, reject_reports? ? :reject_reports : nil].reject { |policy| policy == :noop || policy.nil? }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-06-22 08:13:10 +10:00
|
|
|
class << self
|
|
|
|
def suspend?(domain)
|
|
|
|
!!rule_for(domain)&.suspend?
|
|
|
|
end
|
|
|
|
|
|
|
|
def silence?(domain)
|
|
|
|
!!rule_for(domain)&.silence?
|
|
|
|
end
|
|
|
|
|
|
|
|
def reject_media?(domain)
|
|
|
|
!!rule_for(domain)&.reject_media?
|
|
|
|
end
|
|
|
|
|
|
|
|
def reject_reports?(domain)
|
|
|
|
!!rule_for(domain)&.reject_reports?
|
|
|
|
end
|
|
|
|
|
|
|
|
alias blocked? suspend?
|
|
|
|
|
|
|
|
def rule_for(domain)
|
|
|
|
return if domain.blank?
|
|
|
|
|
2023-06-06 22:50:51 +10:00
|
|
|
uri = Addressable::URI.new.tap { |u| u.host = domain.strip.delete('/') }
|
2019-06-22 08:13:10 +10:00
|
|
|
segments = uri.normalized_host.split('.')
|
2023-07-12 18:03:06 +10:00
|
|
|
variants = segments.map.with_index { |_, i| segments[i..].join('.') }
|
2019-06-22 08:13:10 +10:00
|
|
|
|
2020-01-09 08:42:05 +11:00
|
|
|
where(domain: variants).order(Arel.sql('char_length(domain) desc')).first
|
2020-06-01 11:47:20 +10:00
|
|
|
rescue Addressable::URI::InvalidURIError, IDN::Idna::IdnaError
|
|
|
|
nil
|
2019-06-22 08:13:10 +10:00
|
|
|
end
|
2016-10-09 23:48:43 +11:00
|
|
|
end
|
2019-05-04 04:36:36 +10:00
|
|
|
|
|
|
|
def stricter_than?(other_block)
|
2019-06-22 08:13:10 +10:00
|
|
|
return true if suspend?
|
2019-05-04 04:36:36 +10:00
|
|
|
return false if other_block.suspend? && (silence? || noop?)
|
|
|
|
return false if other_block.silence? && noop?
|
2019-06-22 08:13:10 +10:00
|
|
|
|
2019-05-04 04:36:36 +10:00
|
|
|
(reject_media || !other_block.reject_media) && (reject_reports || !other_block.reject_reports)
|
|
|
|
end
|
2019-05-15 03:05:02 +10:00
|
|
|
|
2020-12-18 18:30:41 +11:00
|
|
|
def public_domain
|
|
|
|
return domain unless obfuscate?
|
|
|
|
|
|
|
|
length = domain.size
|
|
|
|
visible_ratio = length / 4
|
|
|
|
|
|
|
|
domain.chars.map.with_index do |chr, i|
|
|
|
|
if i > visible_ratio && i < length - visible_ratio && chr != '.'
|
|
|
|
'*'
|
|
|
|
else
|
|
|
|
chr
|
|
|
|
end
|
|
|
|
end.join
|
|
|
|
end
|
|
|
|
|
|
|
|
def domain_digest
|
|
|
|
Digest::SHA256.hexdigest(domain)
|
|
|
|
end
|
2016-10-09 23:48:43 +11:00
|
|
|
end
|