1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
|
# frozen_string_literal: true
# == Schema Information
#
# Table name: domain_blocks
#
# id :bigint(8) not null, primary key
# domain :string default(""), not null
# created_at :datetime not null
# updated_at :datetime not null
# severity :integer default("noop")
# reject_media :boolean default(FALSE), not null
# reject_reports :boolean default(FALSE), not null
# force_sensitive :boolean default(FALSE), not null
# reason :text
# reject_unknown :boolean default(FALSE), not null
# processing :boolean default(TRUE), not null
# manual_only :boolean default(FALSE), not null
#
class DomainBlock < ApplicationRecord
include DomainNormalizable
enum severity: [:noop, :force_unlisted, :silence, :suspend]
validates :domain, presence: true, uniqueness: true
has_many :accounts, foreign_key: :domain, primary_key: :domain
delegate :count, to: :accounts, prefix: true
scope :matches_domain, ->(value) { where(arel_table[:domain].matches("%#{value}%")) }
scope :unprocessed, -> { where(processing: true) }
before_save :set_processing
def self.blocked?(domain)
suspend.where(domain: domain).or(suspend.where('domain LIKE ?', "%.#{domain}")).exists?
end
def self.force_unlisted?(domain)
where(domain: domain, severity: :force_unlisted).exists?
end
def stricter_than?(other_block)
return true if suspend?
return false if other_block.suspend? && !suspend?
return false if other_block.silence? && (noop? || force_unlisted?)
return false if other_block.force_unlisted? && noop?
(reject_media || !other_block.reject_media) && (reject_reports || !other_block.reject_reports)
end
def affected_accounts_count
scope = suspend? ? accounts.where(suspended_at: created_at) : accounts.where(silenced_at: created_at)
scope.count
end
def additionals
additionals = []
additionals << "force sensitive media" if force_sensitive?
additionals << "reject media" if reject_media?
additionals << "reject reports" if reject_reports?
additionals << "reject unknown accounts" if reject_unknown?
additionals << "manual trust only" if manual_only?
additionals
end
def template
self.attributes.except('id', 'domain', 'created_at', 'updated_at', 'processing')
end
# workaround for the domain policy editor
def undo
false
end
private
def set_processing
return if processing
return unless (changed & %w(severity suspended_at silenced_at force_sensitive reject_media reject_reports reject_unknown manual_only)).any?
self.processing = true
end
end
|