2016-11-15 16:56:29 +01:00
|
|
|
# frozen_string_literal: true
|
2017-05-02 02:14:47 +02:00
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: domain_blocks
|
|
|
|
#
|
2019-08-07 20:20:23 +02:00
|
|
|
# id :bigint(8) not null, primary key
|
|
|
|
# domain :string default(""), not null
|
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
|
|
|
# severity :integer default("silence")
|
|
|
|
# reject_media :boolean default(FALSE), not null
|
|
|
|
# reject_reports :boolean default(FALSE), not null
|
|
|
|
# private_comment :text
|
|
|
|
# public_comment :text
|
2017-05-02 02:14:47 +02:00
|
|
|
#
|
2016-11-15 16:56:29 +01:00
|
|
|
|
2016-10-09 14:48:43 +02:00
|
|
|
class DomainBlock < ApplicationRecord
|
2018-12-26 06:38:42 +01:00
|
|
|
include DomainNormalizable
|
|
|
|
|
2017-07-24 14:26:55 +02:00
|
|
|
enum severity: [:silence, :suspend, :noop]
|
2017-01-23 17:38:38 +01:00
|
|
|
|
2019-08-08 23:04:19 +02:00
|
|
|
validates :domain, presence: true, uniqueness: true, domain: true
|
2016-10-09 14:48:43 +02:00
|
|
|
|
2017-04-16 19:37:01 +02:00
|
|
|
has_many :accounts, foreign_key: :domain, primary_key: :domain
|
|
|
|
delegate :count, to: :accounts, prefix: true
|
|
|
|
|
2019-02-18 14:59:19 +01:00
|
|
|
scope :matches_domain, ->(value) { where(arel_table[:domain].matches("%#{value}%")) }
|
2019-08-19 11:35:48 +02:00
|
|
|
scope :with_user_facing_limitations, -> { where(severity: [:silence, :suspend]).or(where(reject_media: true)) }
|
2019-09-19 11:09:05 +02:00
|
|
|
scope :by_severity, -> { order(Arel.sql('(CASE severity WHEN 0 THEN 1 WHEN 1 THEN 2 WHEN 2 THEN 0 END), reject_media, domain')) }
|
2019-02-18 14:59:19 +01:00
|
|
|
|
2019-06-22 00:13:10 +02:00
|
|
|
class << self
|
|
|
|
def suspend?(domain)
|
|
|
|
!!rule_for(domain)&.suspend?
|
|
|
|
end
|
|
|
|
|
|
|
|
def silence?(domain)
|
|
|
|
!!rule_for(domain)&.silence?
|
|
|
|
end
|
|
|
|
|
|
|
|
def reject_media?(domain)
|
|
|
|
!!rule_for(domain)&.reject_media?
|
|
|
|
end
|
|
|
|
|
|
|
|
def reject_reports?(domain)
|
|
|
|
!!rule_for(domain)&.reject_reports?
|
|
|
|
end
|
|
|
|
|
|
|
|
alias blocked? suspend?
|
|
|
|
|
|
|
|
def rule_for(domain)
|
|
|
|
return if domain.blank?
|
|
|
|
|
2020-06-01 03:47:20 +02:00
|
|
|
uri = Addressable::URI.new.tap { |u| u.host = domain.strip.gsub(/[\/]/, '') }
|
2019-06-22 00:13:10 +02:00
|
|
|
segments = uri.normalized_host.split('.')
|
|
|
|
variants = segments.map.with_index { |_, i| segments[i..-1].join('.') }
|
|
|
|
|
2020-01-08 22:42:05 +01:00
|
|
|
where(domain: variants).order(Arel.sql('char_length(domain) desc')).first
|
2020-06-01 03:47:20 +02:00
|
|
|
rescue Addressable::URI::InvalidURIError, IDN::Idna::IdnaError
|
|
|
|
nil
|
2019-06-22 00:13:10 +02:00
|
|
|
end
|
2016-10-09 14:48:43 +02:00
|
|
|
end
|
2019-05-03 20:36:36 +02:00
|
|
|
|
|
|
|
def stricter_than?(other_block)
|
2019-06-22 00:13:10 +02:00
|
|
|
return true if suspend?
|
2019-05-03 20:36:36 +02:00
|
|
|
return false if other_block.suspend? && (silence? || noop?)
|
|
|
|
return false if other_block.silence? && noop?
|
2019-06-22 00:13:10 +02:00
|
|
|
|
2019-05-03 20:36:36 +02:00
|
|
|
(reject_media || !other_block.reject_media) && (reject_reports || !other_block.reject_reports)
|
|
|
|
end
|
2019-05-14 19:05:02 +02:00
|
|
|
|
|
|
|
def affected_accounts_count
|
|
|
|
scope = suspend? ? accounts.where(suspended_at: created_at) : accounts.where(silenced_at: created_at)
|
|
|
|
scope.count
|
|
|
|
end
|
2016-10-09 14:48:43 +02:00
|
|
|
end
|