| 
									
										
										
										
											2023-03-12 16:00:57 +01:00
										 |  |  | // GoToSocial | 
					
						
							|  |  |  | // Copyright (C) GoToSocial Authors admin@gotosocial.org | 
					
						
							|  |  |  | // SPDX-License-Identifier: AGPL-3.0-or-later | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  | // it under the terms of the GNU Affero General Public License as published by | 
					
						
							|  |  |  | // the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  | // (at your option) any later version. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is distributed in the hope that it will be useful, | 
					
						
							|  |  |  | // but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  | // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
					
						
							|  |  |  | // GNU Affero General Public License for more details. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // You should have received a copy of the GNU Affero General Public License | 
					
						
							|  |  |  | // along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-08-25 15:34:33 +02:00
										 |  |  | package bundb | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"context" | 
					
						
							|  |  |  | 	"net/url" | 
					
						
							| 
									
										
										
										
											2024-11-21 14:09:58 +01:00
										 |  |  | 	"time" | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-04-26 15:34:10 +02:00
										 |  |  | 	"code.superseriousbusiness.org/gotosocial/internal/config" | 
					
						
							|  |  |  | 	"code.superseriousbusiness.org/gotosocial/internal/db" | 
					
						
							|  |  |  | 	"code.superseriousbusiness.org/gotosocial/internal/gtserror" | 
					
						
							|  |  |  | 	"code.superseriousbusiness.org/gotosocial/internal/gtsmodel" | 
					
						
							|  |  |  | 	"code.superseriousbusiness.org/gotosocial/internal/state" | 
					
						
							|  |  |  | 	"code.superseriousbusiness.org/gotosocial/internal/util" | 
					
						
							| 
									
										
										
										
											2022-10-08 13:50:48 +02:00
										 |  |  | 	"github.com/uptrace/bun" | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | type domainDB struct { | 
					
						
							| 
									
										
										
										
											2024-02-07 14:43:27 +00:00
										 |  |  | 	db    *bun.DB | 
					
						
							| 
									
										
										
										
											2022-12-08 17:35:14 +00:00
										 |  |  | 	state *state.State | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-04-04 18:29:22 +02:00
										 |  |  | func (d *domainDB) PutDomainAllow(ctx context.Context, allow *gtsmodel.DomainAllow) (err error) { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 	// Normalize the domain as punycode, note the extra | 
					
						
							|  |  |  | 	// validation step for domain name write operations. | 
					
						
							|  |  |  | 	allow.Domain, err = util.PunifySafely(allow.Domain) | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 		return gtserror.Newf("error punifying domain %s: %w", allow.Domain, err) | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Attempt to store domain allow in DB | 
					
						
							|  |  |  | 	if _, err := d.db.NewInsert(). | 
					
						
							|  |  |  | 		Model(allow). | 
					
						
							|  |  |  | 		Exec(ctx); err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Clear the domain allow cache (for later reload) | 
					
						
							| 
									
										
										
										
											2024-07-24 09:41:43 +01:00
										 |  |  | 	d.state.Caches.DB.DomainAllow.Clear() | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (d *domainDB) GetDomainAllow(ctx context.Context, domain string) (*gtsmodel.DomainAllow, error) { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 	// Normalize domain as punycode for lookup. | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	domain, err := util.Punify(domain) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 		return nil, gtserror.Newf("error punifying domain %s: %w", domain, err) | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Check for easy case, domain referencing *us* | 
					
						
							|  |  |  | 	if domain == "" || domain == config.GetAccountDomain() || | 
					
						
							|  |  |  | 		domain == config.GetHost() { | 
					
						
							|  |  |  | 		return nil, db.ErrNoEntries | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	var allow gtsmodel.DomainAllow | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Look for allow matching domain in DB | 
					
						
							|  |  |  | 	q := d.db. | 
					
						
							|  |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&allow). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("domain_allow.domain"), domain) | 
					
						
							|  |  |  | 	if err := q.Scan(ctx); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return &allow, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (d *domainDB) GetDomainAllows(ctx context.Context) ([]*gtsmodel.DomainAllow, error) { | 
					
						
							|  |  |  | 	allows := []*gtsmodel.DomainAllow{} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if err := d.db. | 
					
						
							|  |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&allows). | 
					
						
							|  |  |  | 		Scan(ctx); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return allows, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-06-15 12:36:51 +02:00
										 |  |  | func (d *domainDB) GetDomainAllowsBySubscriptionID(ctx context.Context, subscriptionID string) ([]*gtsmodel.DomainAllow, error) { | 
					
						
							|  |  |  | 	allows := []*gtsmodel.DomainAllow{} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if err := d.db. | 
					
						
							|  |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&allows). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("subscription_id"), subscriptionID). | 
					
						
							|  |  |  | 		Scan(ctx); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return allows, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | func (d *domainDB) GetDomainAllowByID(ctx context.Context, id string) (*gtsmodel.DomainAllow, error) { | 
					
						
							|  |  |  | 	var allow gtsmodel.DomainAllow | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	q := d.db. | 
					
						
							|  |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&allow). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("domain_allow.id"), id) | 
					
						
							|  |  |  | 	if err := q.Scan(ctx); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return &allow, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | func (d *domainDB) UpdateDomainAllow(ctx context.Context, allow *gtsmodel.DomainAllow, columns ...string) (err error) { | 
					
						
							|  |  |  | 	// Normalize the domain as punycode, note the extra | 
					
						
							|  |  |  | 	// validation step for domain name write operations. | 
					
						
							|  |  |  | 	allow.Domain, err = util.PunifySafely(allow.Domain) | 
					
						
							| 
									
										
										
										
											2024-11-21 14:09:58 +01:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 		return gtserror.Newf("error punifying domain %s: %w", allow.Domain, err) | 
					
						
							| 
									
										
										
										
											2024-11-21 14:09:58 +01:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Ensure updated_at is set. | 
					
						
							|  |  |  | 	allow.UpdatedAt = time.Now() | 
					
						
							|  |  |  | 	if len(columns) != 0 { | 
					
						
							|  |  |  | 		columns = append(columns, "updated_at") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Attempt to update domain allow. | 
					
						
							|  |  |  | 	if _, err := d.db. | 
					
						
							|  |  |  | 		NewUpdate(). | 
					
						
							|  |  |  | 		Model(allow). | 
					
						
							|  |  |  | 		Column(columns...). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("domain_allow.id"), allow.ID). | 
					
						
							|  |  |  | 		Exec(ctx); err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Clear the domain allow cache (for later reload) | 
					
						
							|  |  |  | 	d.state.Caches.DB.DomainAllow.Clear() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | func (d *domainDB) DeleteDomainAllow(ctx context.Context, domain string) error { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 	// Normalize domain as punycode for lookup. | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	domain, err := util.Punify(domain) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 		return gtserror.Newf("error punifying domain %s: %w", domain, err) | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Attempt to delete domain allow | 
					
						
							|  |  |  | 	if _, err := d.db.NewDelete(). | 
					
						
							|  |  |  | 		Model((*gtsmodel.DomainAllow)(nil)). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("domain_allow.domain"), domain). | 
					
						
							|  |  |  | 		Exec(ctx); err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Clear the domain allow cache (for later reload) | 
					
						
							| 
									
										
										
										
											2024-07-24 09:41:43 +01:00
										 |  |  | 	d.state.Caches.DB.DomainAllow.Clear() | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-04-04 18:29:22 +02:00
										 |  |  | func (d *domainDB) PutDomainBlock(ctx context.Context, block *gtsmodel.DomainBlock) error { | 
					
						
							| 
									
										
										
										
											2023-05-07 19:53:21 +02:00
										 |  |  | 	var err error | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// Normalize the domain as punycode, note the extra | 
					
						
							|  |  |  | 	// validation step for domain name write operations. | 
					
						
							|  |  |  | 	block.Domain, err = util.PunifySafely(block.Domain) | 
					
						
							| 
									
										
										
										
											2022-10-01 17:48:38 +02:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 		return gtserror.Newf("error punifying domain %s: %w", block.Domain, err) | 
					
						
							| 
									
										
										
										
											2022-10-01 17:48:38 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | 	// Attempt to store domain block in DB | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	if _, err := d.db.NewInsert(). | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 		Model(block). | 
					
						
							|  |  |  | 		Exec(ctx); err != nil { | 
					
						
							| 
									
										
										
										
											2023-08-17 17:26:21 +01:00
										 |  |  | 		return err | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Clear the domain block cache (for later reload) | 
					
						
							| 
									
										
										
										
											2024-07-24 09:41:43 +01:00
										 |  |  | 	d.state.Caches.DB.DomainBlock.Clear() | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) GetDomainBlock(ctx context.Context, domain string) (*gtsmodel.DomainBlock, error) { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 	// Normalize domain as punycode for lookup. | 
					
						
							| 
									
										
										
										
											2023-05-07 19:53:21 +02:00
										 |  |  | 	domain, err := util.Punify(domain) | 
					
						
							| 
									
										
										
										
											2022-10-01 17:48:38 +02:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 		return nil, gtserror.Newf("error punifying domain %s: %w", domain, err) | 
					
						
							| 
									
										
										
										
											2022-10-01 17:48:38 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	// Check for easy case, domain referencing *us* | 
					
						
							|  |  |  | 	if domain == "" || domain == config.GetAccountDomain() || | 
					
						
							|  |  |  | 		domain == config.GetHost() { | 
					
						
							|  |  |  | 		return nil, db.ErrNoEntries | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	var block gtsmodel.DomainBlock | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	// Look for block matching domain in DB | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	q := d.db. | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&block). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("domain_block.domain"), domain) | 
					
						
							|  |  |  | 	if err := q.Scan(ctx); err != nil { | 
					
						
							| 
									
										
										
										
											2023-08-17 17:26:21 +01:00
										 |  |  | 		return nil, err | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	return &block, nil | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | func (d *domainDB) GetDomainBlocks(ctx context.Context) ([]*gtsmodel.DomainBlock, error) { | 
					
						
							|  |  |  | 	blocks := []*gtsmodel.DomainBlock{} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	if err := d.db. | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&blocks). | 
					
						
							|  |  |  | 		Scan(ctx); err != nil { | 
					
						
							| 
									
										
										
										
											2023-08-17 17:26:21 +01:00
										 |  |  | 		return nil, err | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return blocks, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-06-15 12:36:51 +02:00
										 |  |  | func (d *domainDB) GetDomainBlocksBySubscriptionID(ctx context.Context, subscriptionID string) ([]*gtsmodel.DomainBlock, error) { | 
					
						
							|  |  |  | 	blocks := []*gtsmodel.DomainBlock{} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if err := d.db. | 
					
						
							|  |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&blocks). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("subscription_id"), subscriptionID). | 
					
						
							|  |  |  | 		Scan(ctx); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return blocks, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) GetDomainBlockByID(ctx context.Context, id string) (*gtsmodel.DomainBlock, error) { | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | 	var block gtsmodel.DomainBlock | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	q := d.db. | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | 		NewSelect(). | 
					
						
							|  |  |  | 		Model(&block). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("domain_block.id"), id) | 
					
						
							|  |  |  | 	if err := q.Scan(ctx); err != nil { | 
					
						
							| 
									
										
										
										
											2023-08-17 17:26:21 +01:00
										 |  |  | 		return nil, err | 
					
						
							| 
									
										
										
										
											2023-07-07 11:34:12 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return &block, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-11-21 14:09:58 +01:00
										 |  |  | func (d *domainDB) UpdateDomainBlock(ctx context.Context, block *gtsmodel.DomainBlock, columns ...string) error { | 
					
						
							|  |  |  | 	var err error | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// Normalize the domain as punycode, note the extra | 
					
						
							|  |  |  | 	// validation step for domain name write operations. | 
					
						
							|  |  |  | 	block.Domain, err = util.PunifySafely(block.Domain) | 
					
						
							| 
									
										
										
										
											2024-11-21 14:09:58 +01:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 		return gtserror.Newf("error punifying domain %s: %w", block.Domain, err) | 
					
						
							| 
									
										
										
										
											2024-11-21 14:09:58 +01:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Ensure updated_at is set. | 
					
						
							|  |  |  | 	block.UpdatedAt = time.Now() | 
					
						
							|  |  |  | 	if len(columns) != 0 { | 
					
						
							|  |  |  | 		columns = append(columns, "updated_at") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Attempt to update domain block. | 
					
						
							|  |  |  | 	if _, err := d.db. | 
					
						
							|  |  |  | 		NewUpdate(). | 
					
						
							|  |  |  | 		Model(block). | 
					
						
							|  |  |  | 		Column(columns...). | 
					
						
							|  |  |  | 		Where("? = ?", bun.Ident("domain_block.id"), block.ID). | 
					
						
							|  |  |  | 		Exec(ctx); err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Clear the domain block cache (for later reload) | 
					
						
							|  |  |  | 	d.state.Caches.DB.DomainBlock.Clear() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) DeleteDomainBlock(ctx context.Context, domain string) error { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 	// Normalize domain as punycode for lookup. | 
					
						
							| 
									
										
										
										
											2023-05-07 19:53:21 +02:00
										 |  |  | 	domain, err := util.Punify(domain) | 
					
						
							| 
									
										
										
										
											2022-10-01 17:48:38 +02:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 		return gtserror.Newf("error punifying domain %s: %w", domain, err) | 
					
						
							| 
									
										
										
										
											2022-10-01 17:48:38 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 	// Attempt to delete domain block | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	if _, err := d.db.NewDelete(). | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 		Model((*gtsmodel.DomainBlock)(nil)). | 
					
						
							| 
									
										
										
										
											2022-10-08 13:50:48 +02:00
										 |  |  | 		Where("? = ?", bun.Ident("domain_block.domain"), domain). | 
					
						
							| 
									
										
										
										
											2022-10-01 17:48:38 +02:00
										 |  |  | 		Exec(ctx); err != nil { | 
					
						
							| 
									
										
										
										
											2023-08-17 17:26:21 +01:00
										 |  |  | 		return err | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	// Clear the domain block cache (for later reload) | 
					
						
							| 
									
										
										
										
											2024-07-24 09:41:43 +01:00
										 |  |  | 	d.state.Caches.DB.DomainBlock.Clear() | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) IsDomainBlocked(ctx context.Context, domain string) (bool, error) { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 	// Normalize domain as punycode for lookup. | 
					
						
							| 
									
										
										
										
											2023-05-07 19:53:21 +02:00
										 |  |  | 	domain, err := util.Punify(domain) | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2025-01-14 14:23:18 +00:00
										 |  |  | 		return false, gtserror.Newf("error punifying domain %s: %w", domain, err) | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	// Domain referencing *us* cannot be blocked. | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	if domain == "" || domain == config.GetAccountDomain() || | 
					
						
							|  |  |  | 		domain == config.GetHost() { | 
					
						
							|  |  |  | 		return false, nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	// Check the cache for an explicit domain allow (hydrating the cache with callback if necessary). | 
					
						
							| 
									
										
										
										
											2024-07-24 09:41:43 +01:00
										 |  |  | 	explicitAllow, err := d.state.Caches.DB.DomainAllow.Matches(domain, func() ([]string, error) { | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 		var domains []string | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Scan list of all explicitly allowed domains from DB | 
					
						
							|  |  |  | 		q := d.db.NewSelect(). | 
					
						
							|  |  |  | 			Table("domain_allows"). | 
					
						
							|  |  |  | 			Column("domain") | 
					
						
							|  |  |  | 		if err := q.Scan(ctx, &domains); err != nil { | 
					
						
							|  |  |  | 			return nil, err | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		return domains, nil | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return false, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 	// Check the cache for a domain block (hydrating the cache with callback if necessary) | 
					
						
							| 
									
										
										
										
											2024-07-24 09:41:43 +01:00
										 |  |  | 	explicitBlock, err := d.state.Caches.DB.DomainBlock.Matches(domain, func() ([]string, error) { | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 		var domains []string | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Scan list of all blocked domains from DB | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 		q := d.db.NewSelect(). | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 			Table("domain_blocks"). | 
					
						
							|  |  |  | 			Column("domain") | 
					
						
							|  |  |  | 		if err := q.Scan(ctx, &domains); err != nil { | 
					
						
							| 
									
										
										
										
											2023-08-17 17:26:21 +01:00
										 |  |  | 			return nil, err | 
					
						
							| 
									
										
										
										
											2022-12-14 09:55:36 +00:00
										 |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		return domains, nil | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2023-09-21 12:12:04 +02:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return false, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Calculate if blocked | 
					
						
							|  |  |  | 	// based on federation mode. | 
					
						
							|  |  |  | 	switch mode := config.GetInstanceFederationMode(); mode { | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	case config.InstanceFederationModeBlocklist: | 
					
						
							|  |  |  | 		// Blocklist/default mode: explicit allow | 
					
						
							|  |  |  | 		// takes precedence over explicit block. | 
					
						
							|  |  |  | 		// | 
					
						
							|  |  |  | 		// Domains that have neither block | 
					
						
							|  |  |  | 		// or allow entries are allowed. | 
					
						
							|  |  |  | 		return !(explicitAllow || !explicitBlock), nil | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	case config.InstanceFederationModeAllowlist: | 
					
						
							|  |  |  | 		// Allowlist mode: explicit block takes | 
					
						
							|  |  |  | 		// precedence over explicit allow. | 
					
						
							|  |  |  | 		// | 
					
						
							|  |  |  | 		// Domains that have neither block | 
					
						
							|  |  |  | 		// or allow entries are blocked. | 
					
						
							|  |  |  | 		return (explicitBlock || !explicitAllow), nil | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	default: | 
					
						
							|  |  |  | 		// This should never happen but account | 
					
						
							|  |  |  | 		// for it anyway to make the code tidier. | 
					
						
							|  |  |  | 		return false, gtserror.Newf("unrecognized federation mode: %s", mode) | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) AreDomainsBlocked(ctx context.Context, domains []string) (bool, error) { | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 	for _, domain := range domains { | 
					
						
							|  |  |  | 		if blocked, err := d.IsDomainBlocked(ctx, domain); err != nil { | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 			return false, err | 
					
						
							|  |  |  | 		} else if blocked { | 
					
						
							|  |  |  | 			return blocked, nil | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return false, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) IsURIBlocked(ctx context.Context, uri *url.URL) (bool, error) { | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 	return d.IsDomainBlocked(ctx, uri.Hostname()) | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | func (d *domainDB) AreURIsBlocked(ctx context.Context, uris []*url.URL) (bool, error) { | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 	for _, uri := range uris { | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 		if blocked, err := d.IsDomainBlocked(ctx, uri.Hostname()); err != nil { | 
					
						
							|  |  |  | 			return false, err | 
					
						
							|  |  |  | 		} else if blocked { | 
					
						
							|  |  |  | 			return blocked, nil | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-09-02 11:17:46 +01:00
										 |  |  | 	return false, nil | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | } |