106 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
			
		
		
	
	
			106 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
| # frozen_string_literal: true
 | |
| 
 | |
| # == Schema Information
 | |
| #
 | |
| # Table name: domain_blocks
 | |
| #
 | |
| #  id              :bigint(8)        not null, primary key
 | |
| #  domain          :string           default(""), not null
 | |
| #  created_at      :datetime         not null
 | |
| #  updated_at      :datetime         not null
 | |
| #  severity        :integer          default("silence")
 | |
| #  reject_media    :boolean          default(FALSE), not null
 | |
| #  reject_reports  :boolean          default(FALSE), not null
 | |
| #  private_comment :text
 | |
| #  public_comment  :text
 | |
| #  obfuscate       :boolean          default(FALSE), not null
 | |
| #
 | |
| 
 | |
| class DomainBlock < ApplicationRecord
 | |
|   include Paginable
 | |
|   include DomainNormalizable
 | |
|   include DomainMaterializable
 | |
| 
 | |
|   enum :severity, { silence: 0, suspend: 1, noop: 2 }
 | |
| 
 | |
|   validates :domain, presence: true, uniqueness: true, domain: true
 | |
| 
 | |
|   has_many :accounts, foreign_key: :domain, primary_key: :domain, inverse_of: false, dependent: nil
 | |
|   delegate :count, to: :accounts, prefix: true
 | |
| 
 | |
|   scope :with_user_facing_limitations, -> { where(severity: [:silence, :suspend]) }
 | |
|   scope :with_limitations, -> { where(severity: [:silence, :suspend]).or(where(reject_media: true)) }
 | |
|   scope :by_severity, -> { in_order_of(:severity, %w(noop silence suspend)).order(:domain) }
 | |
| 
 | |
|   def to_log_human_identifier
 | |
|     domain
 | |
|   end
 | |
| 
 | |
|   def policies
 | |
|     if suspend?
 | |
|       [:suspend]
 | |
|     else
 | |
|       [severity.to_sym, reject_media? ? :reject_media : nil, reject_reports? ? :reject_reports : nil].reject { |policy| policy == :noop || policy.nil? }
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   class << self
 | |
|     def suspend?(domain)
 | |
|       !!rule_for(domain)&.suspend?
 | |
|     end
 | |
| 
 | |
|     def silence?(domain)
 | |
|       !!rule_for(domain)&.silence?
 | |
|     end
 | |
| 
 | |
|     def reject_media?(domain)
 | |
|       !!rule_for(domain)&.reject_media?
 | |
|     end
 | |
| 
 | |
|     def reject_reports?(domain)
 | |
|       !!rule_for(domain)&.reject_reports?
 | |
|     end
 | |
| 
 | |
|     alias blocked? suspend?
 | |
| 
 | |
|     def rule_for(domain)
 | |
|       return if domain.blank?
 | |
| 
 | |
|       uri      = Addressable::URI.new.tap { |u| u.host = domain.strip.delete('/') }
 | |
|       segments = uri.normalized_host.split('.')
 | |
|       variants = segments.map.with_index { |_, i| segments[i..].join('.') }
 | |
| 
 | |
|       where(domain: variants).by_domain_length.first
 | |
|     rescue Addressable::URI::InvalidURIError, IDN::Idna::IdnaError
 | |
|       nil
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   def stricter_than?(other_block)
 | |
|     return true  if suspend?
 | |
|     return false if other_block.suspend? && (silence? || noop?)
 | |
|     return false if other_block.silence? && noop?
 | |
| 
 | |
|     (reject_media || !other_block.reject_media) && (reject_reports || !other_block.reject_reports)
 | |
|   end
 | |
| 
 | |
|   def public_domain
 | |
|     return domain unless obfuscate?
 | |
| 
 | |
|     length        = domain.size
 | |
|     visible_ratio = length / 4
 | |
| 
 | |
|     domain.chars.map.with_index do |chr, i|
 | |
|       if i > visible_ratio && i < length - visible_ratio && chr != '.'
 | |
|         '*'
 | |
|       else
 | |
|         chr
 | |
|       end
 | |
|     end.join
 | |
|   end
 | |
| 
 | |
|   def domain_digest
 | |
|     Digest::SHA256.hexdigest(domain)
 | |
|   end
 | |
| end
 |