| 
									
										
										
										
											2023-03-12 16:00:57 +01:00
										 |  |  | // GoToSocial | 
					
						
							|  |  |  | // Copyright (C) GoToSocial Authors admin@gotosocial.org | 
					
						
							|  |  |  | // SPDX-License-Identifier: AGPL-3.0-or-later | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  | // it under the terms of the GNU Affero General Public License as published by | 
					
						
							|  |  |  | // the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  | // (at your option) any later version. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is distributed in the hope that it will be useful, | 
					
						
							|  |  |  | // but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  | // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
					
						
							|  |  |  | // GNU Affero General Public License for more details. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // You should have received a copy of the GNU Affero General Public License | 
					
						
							|  |  |  | // along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-08-25 15:34:33 +02:00
										 |  |  | package bundb | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"context" | 
					
						
							|  |  |  | 	"net/url" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/config" | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/db" | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/gtserror" | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | 
					
						
							| 
									
										
										
										
											2022-12-08 17:35:14 +00:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/state" | 
					
						
							| 
									
										
										
										
											2023-05-07 19:53:21 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/util" | 
					
						
							| 
									
										
										
										
											2022-10-08 13:50:48 +02:00
										 |  |  | 	"github.com/uptrace/bun" | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | type domainDB struct { | 
					
						
							| 
									
										
										
										
											2023-08-17 17:26:21 +01:00
										 |  |  | 	db    *DB | 
					
						
							| 
									
										
										
										
											2022-12-08 17:35:14 +00:00
										 |  |  | 	state *state.State | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | func (d *domainDB) CreateDomainAllow(ctx context.Context, allow *gtsmodel.DomainAllow) error { | 
					
						
							|  |  |  | 	// Normalize the domain as punycode | 
					
						
							|  |  |  | 	var err error | 
					
						
							|  |  |  | 	allow.Domain, err = util.Punify(allow.Domain) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Attempt to store domain allow in DB | 
					
						
							|  |  |  | 	if _, err := d.db.NewInsert(). | 
					
						
							|  |  |  | 		Model(allow). | 
					
						
							|  |  |  | 		Exec(ctx); err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Clear the domain allow cache (for later reload) | 
					
						
							|  |  |  | 	d.state.Caches.GTS.DomainAllow().Clear() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (d *domainDB) GetDomainAllow(ctx context.Context, domain string) (*gtsmodel.DomainAllow, error) { | 
					
						
							|  |  |  | 	// Normalize the domain as punycode | 
					
						
							|  |  |  | 	domain, err := util.Punify(domain) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Check for easy case, domain referencing *us* | 
					
						
							|  |  |  | 	if domain == "" || domain == config.GetAccountDomain() || | 
					
						
							|  |  |  | 		domain == config.GetHost() { | 
					
						
							|  |  |  | 		return nil, db.ErrNoEntries | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	var allow gtsmodel.DomainAllow | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Look for allow matching domain in DB | 
					
						
							|  |  |  | 	q := d.db. | 
					
						
							|  |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&allow). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("domain_allow.domain"), domain) | 
					
						
							|  |  |  | 	if err := q.Scan(ctx); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return &allow, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (d *domainDB) GetDomainAllows(ctx context.Context) ([]*gtsmodel.DomainAllow, error) { | 
					
						
							|  |  |  | 	allows := []*gtsmodel.DomainAllow{} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if err := d.db. | 
					
						
							|  |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&allows). | 
					
						
							|  |  |  | 		Scan(ctx); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return allows, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (d *domainDB) GetDomainAllowByID(ctx context.Context, id string) (*gtsmodel.DomainAllow, error) { | 
					
						
							|  |  |  | 	var allow gtsmodel.DomainAllow | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	q := d.db. | 
					
						
							|  |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&allow). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("domain_allow.id"), id) | 
					
						
							|  |  |  | 	if err := q.Scan(ctx); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return &allow, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (d *domainDB) DeleteDomainAllow(ctx context.Context, domain string) error { | 
					
						
							|  |  |  | 	// Normalize the domain as punycode | 
					
						
							|  |  |  | 	domain, err := util.Punify(domain) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Attempt to delete domain allow | 
					
						
							|  |  |  | 	if _, err := d.db.NewDelete(). | 
					
						
							|  |  |  | 		Model((*gtsmodel.DomainAllow)(nil)). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("domain_allow.domain"), domain). | 
					
						
							|  |  |  | 		Exec(ctx); err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Clear the domain allow cache (for later reload) | 
					
						
							|  |  |  | 	d.state.Caches.GTS.DomainAllow().Clear() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) CreateDomainBlock(ctx context.Context, block *gtsmodel.DomainBlock) error { | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	// Normalize the domain as punycode | 
					
						
							| 
									
										
										
										
											2023-05-07 19:53:21 +02:00
										 |  |  | 	var err error | 
					
						
							|  |  |  | 	block.Domain, err = util.Punify(block.Domain) | 
					
						
							| 
									
										
										
										
											2022-10-01 17:48:38 +02:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | 	// Attempt to store domain block in DB | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	if _, err := d.db.NewInsert(). | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 		Model(block). | 
					
						
							|  |  |  | 		Exec(ctx); err != nil { | 
					
						
							| 
									
										
										
										
											2023-08-17 17:26:21 +01:00
										 |  |  | 		return err | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Clear the domain block cache (for later reload) | 
					
						
							|  |  |  | 	d.state.Caches.GTS.DomainBlock().Clear() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) GetDomainBlock(ctx context.Context, domain string) (*gtsmodel.DomainBlock, error) { | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	// Normalize the domain as punycode | 
					
						
							| 
									
										
										
										
											2023-05-07 19:53:21 +02:00
										 |  |  | 	domain, err := util.Punify(domain) | 
					
						
							| 
									
										
										
										
											2022-10-01 17:48:38 +02:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	// Check for easy case, domain referencing *us* | 
					
						
							|  |  |  | 	if domain == "" || domain == config.GetAccountDomain() || | 
					
						
							|  |  |  | 		domain == config.GetHost() { | 
					
						
							|  |  |  | 		return nil, db.ErrNoEntries | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	var block gtsmodel.DomainBlock | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	// Look for block matching domain in DB | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	q := d.db. | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&block). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("domain_block.domain"), domain) | 
					
						
							|  |  |  | 	if err := q.Scan(ctx); err != nil { | 
					
						
							| 
									
										
										
										
											2023-08-17 17:26:21 +01:00
										 |  |  | 		return nil, err | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	return &block, nil | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | func (d *domainDB) GetDomainBlocks(ctx context.Context) ([]*gtsmodel.DomainBlock, error) { | 
					
						
							|  |  |  | 	blocks := []*gtsmodel.DomainBlock{} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	if err := d.db. | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&blocks). | 
					
						
							|  |  |  | 		Scan(ctx); err != nil { | 
					
						
							| 
									
										
										
										
											2023-08-17 17:26:21 +01:00
										 |  |  | 		return nil, err | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return blocks, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) GetDomainBlockByID(ctx context.Context, id string) (*gtsmodel.DomainBlock, error) { | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | 	var block gtsmodel.DomainBlock | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	q := d.db. | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&block). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("domain_block.id"), id) | 
					
						
							|  |  |  | 	if err := q.Scan(ctx); err != nil { | 
					
						
							| 
									
										
										
										
											2023-08-17 17:26:21 +01:00
										 |  |  | 		return nil, err | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return &block, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) DeleteDomainBlock(ctx context.Context, domain string) error { | 
					
						
							| 
									
										
										
										
											2023-05-07 19:53:21 +02:00
										 |  |  | 	// Normalize the domain as punycode | 
					
						
							|  |  |  | 	domain, err := util.Punify(domain) | 
					
						
							| 
									
										
										
										
											2022-10-01 17:48:38 +02:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 	// Attempt to delete domain block | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	if _, err := d.db.NewDelete(). | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 		Model((*gtsmodel.DomainBlock)(nil)). | 
					
						
							| 
									
										
										
										
											2022-10-08 13:50:48 +02:00
										 |  |  | 		Where("? = ?", bun.Ident("domain_block.domain"), domain). | 
					
						
							| 
									
										
										
										
											2022-10-01 17:48:38 +02:00
										 |  |  | 		Exec(ctx); err != nil { | 
					
						
							| 
									
										
										
										
											2023-08-17 17:26:21 +01:00
										 |  |  | 		return err | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	// Clear the domain block cache (for later reload) | 
					
						
							|  |  |  | 	d.state.Caches.GTS.DomainBlock().Clear() | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) IsDomainBlocked(ctx context.Context, domain string) (bool, error) { | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	// Normalize the domain as punycode | 
					
						
							| 
									
										
										
										
											2023-05-07 19:53:21 +02:00
										 |  |  | 	domain, err := util.Punify(domain) | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return false, err | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	// Domain referencing *us* cannot be blocked. | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	if domain == "" || domain == config.GetAccountDomain() || | 
					
						
							|  |  |  | 		domain == config.GetHost() { | 
					
						
							|  |  |  | 		return false, nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	// Check the cache for an explicit domain allow (hydrating the cache with callback if necessary). | 
					
						
							|  |  |  | 	explicitAllow, err := d.state.Caches.GTS.DomainAllow().Matches(domain, func() ([]string, error) { | 
					
						
							|  |  |  | 		var domains []string | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Scan list of all explicitly allowed domains from DB | 
					
						
							|  |  |  | 		q := d.db.NewSelect(). | 
					
						
							|  |  |  | 			Table("domain_allows"). | 
					
						
							|  |  |  | 			Column("domain") | 
					
						
							|  |  |  | 		if err := q.Scan(ctx, &domains); err != nil { | 
					
						
							|  |  |  | 			return nil, err | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		return domains, nil | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return false, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	// Check the cache for a domain block (hydrating the cache with callback if necessary) | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	explicitBlock, err := d.state.Caches.GTS.DomainBlock().Matches(domain, func() ([]string, error) { | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 		var domains []string | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Scan list of all blocked domains from DB | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 		q := d.db.NewSelect(). | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 			Table("domain_blocks"). | 
					
						
							|  |  |  | 			Column("domain") | 
					
						
							|  |  |  | 		if err := q.Scan(ctx, &domains); err != nil { | 
					
						
							| 
									
										
										
										
											2023-08-17 17:26:21 +01:00
										 |  |  | 			return nil, err | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		return domains, nil | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return false, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Calculate if blocked | 
					
						
							|  |  |  | 	// based on federation mode. | 
					
						
							|  |  |  | 	switch mode := config.GetInstanceFederationMode(); mode { | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	case config.InstanceFederationModeBlocklist: | 
					
						
							|  |  |  | 		// Blocklist/default mode: explicit allow | 
					
						
							|  |  |  | 		// takes precedence over explicit block. | 
					
						
							|  |  |  | 		// | 
					
						
							|  |  |  | 		// Domains that have neither block | 
					
						
							|  |  |  | 		// or allow entries are allowed. | 
					
						
							|  |  |  | 		return !(explicitAllow || !explicitBlock), nil | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	case config.InstanceFederationModeAllowlist: | 
					
						
							|  |  |  | 		// Allowlist mode: explicit block takes | 
					
						
							|  |  |  | 		// precedence over explicit allow. | 
					
						
							|  |  |  | 		// | 
					
						
							|  |  |  | 		// Domains that have neither block | 
					
						
							|  |  |  | 		// or allow entries are blocked. | 
					
						
							|  |  |  | 		return (explicitBlock || !explicitAllow), nil | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	default: | 
					
						
							|  |  |  | 		// This should never happen but account | 
					
						
							|  |  |  | 		// for it anyway to make the code tidier. | 
					
						
							|  |  |  | 		return false, gtserror.Newf("unrecognized federation mode: %s", mode) | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) AreDomainsBlocked(ctx context.Context, domains []string) (bool, error) { | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 	for _, domain := range domains { | 
					
						
							|  |  |  | 		if blocked, err := d.IsDomainBlocked(ctx, domain); err != nil { | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 			return false, err | 
					
						
							|  |  |  | 		} else if blocked { | 
					
						
							|  |  |  | 			return blocked, nil | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return false, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) IsURIBlocked(ctx context.Context, uri *url.URL) (bool, error) { | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 	return d.IsDomainBlocked(ctx, uri.Hostname()) | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) AreURIsBlocked(ctx context.Context, uris []*url.URL) (bool, error) { | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 	for _, uri := range uris { | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 		if blocked, err := d.IsDomainBlocked(ctx, uri.Hostname()); err != nil { | 
					
						
							|  |  |  | 			return false, err | 
					
						
							|  |  |  | 		} else if blocked { | 
					
						
							|  |  |  | 			return blocked, nil | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 	return false, nil | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | } |