2jl66>eZ-gZAyF5dFEi;gPxgVU
z7}95iJQ#BBysTNQL2@kQjvSPZ=Xv$k%!bfYbz-qaDepyNcqq6AkH(t^a@jucj4r++
zjgK=(Q)t+IyslkiovY$2Z$i9GN?zGmm?m|!mHT}8l){@jbJm?CA0xT+zFN8B5b+!L
zjdy4CM(0XL>{v4Fsy8QJp-Dqi4J)zSHYehe`+`)Kv_s=UjH=e?x%3QOx>=f8{r$|BbD&}87>LYKGFc2!7hij3r
zgz$ascWmLTEr8XIB?BVxS#fJnLd~Qn+JSi9?agt@x+;@JsmyM2?e!5qzmIEVOAPer
zX7+r!K?}WQCxp-4fkv10At&{X-333IS=z^i4}8M1o?g}-V8wk6vq;4c#ngn6czK6lfumWUs`+hoCfB6L8J*`I=dUov
zZ1tY52ce_F8bjr~k4ww*&t&I35A&lRySb4K&R~gdB^jxzJw0>T0_B1nBZAF%)+Zvhf
zZpD~!zJ!}JE7T&-oF*$sA!AuWz%m(^@qG?%d@>rfHDYuD^RmJn7o>f<4itS?oQHt?$gG0ib>Mck{AS)98s<>Bny^i>{lClo;46^V8oIoi>2%krC)(?%Uf(+Oq&f&9UoDaz&
zAZL=(ESgI43VLDE7}PF_5o?7sQo|nEz6{;I8^6e|z9I`E&AWCZ;P_YoY2!sN8(O&b
zZj|vRUzYdRH(QO8d!*~sch5rTFKS5l`(bu#zdTF6D9jTu^5Pt2ho*iu!=)Wgk-2#w
zy%q1!aBf_hh?@V63QY}3G#_SXrBPgkIx!$##`Fd8sX@}4iFblY9=Q#B%=R>nh=`dC
zl{s{{4nS3CgXIc@!pZmU6<5_wdd}H`60)D?8*OKc^cE2tfV2_u)i$?q88sAens#zA
z-Ixas-h&y-q#95(UB5LhfK~?Iu^skR<0n{oj;#LLMh?m;H5j$idJGa8B^l5pc77}
zu6=CGD@4a$dIIycCA0UnBfl;!VTPedOXV-J#0kq1tOIeUif??nRVzy@4$4UKoY@#o
z-CY~xu4c~C6!}_EJLWJ2Qrk0;Q68>!u0Nx9d%+L0Eg;zz>Q#9oj`DaBjrEg23c@aQ
z)q+p{mx$+;z{X9aF1hPmt9{%3S-06ETfu&>JRmu~m`by2Q8*%Gjn9n@Z1ejR=d0o+
z$Hy@qiUrrQ0P^NbZo$9rpSu@t=+Xw<
ztC*v(E1!6<;hS#OtnRxUQ_!WQTEBh;eZ~C=7u;%lt~7FNwy=dOeBqVn=0sd=Zc*Dn
zZzJ=z=tA;XU`XZlGNUZ!j16k;oyR_F{RY+CG-t)!?fbkIs>V;=s?Y~%e@t7b0*-uL
z%o<4F9?Xp2?ywSVBrZssGb{^8Y5>@*DRzb8_G#|2$5z={@UBq&u6+d4hXtMist&|L
z-LojPBgNOQdPBGsD*;w9`d*g!bclcvsI|Rv$2G}gGQnNd=tSjW&B?}XhvZvCmspHM
z*N2>fNA}iAAzQVo!7s*lR@x&;^G0if6*YCwC8!wLY|mFLG;A-94VLs=W9KJN80%YC
zr19bRUT$JunrOh!YvD$Tag=?!xpc7)`=rgKh02wukMXGOr9L}%X(|Q+l%YCpV?AM}pBDq@EVUMXkwL0QxR^4-TNXk3q&>j)k!|WS+6SUF_9(
z!R^k|doLLxNWA6h9~ip!Z}5KJoJy7~)OYE=0_>R_`GBR7}p5L|N`J
zK*Y+P5sW$miL2S?6T}lgmB}6#)4#a`C55oh1dE_n8R4*dVoYQ!*$@;
zcZZF%-%=MEJ)mS7>bSGis0eeO$$A!q*-XZSE({HLue@XS=+#Y+r*~ZIP^1aOK6aw6
zogt}Al9Z(m_R4ik-3P!X%{sU&KDq2e7z<0zp$Spla11ZO3B@shq4w_#V?b~mOZ9nTV
zbo+SL5N1psm`TcND_3k4n&mZL&TJG}q|_WlWp`FmRt1KT-l1h8xd_w{)B=keT(FL_o2(CeA)yRuI(v8Q<)Dy$
zZq&{)1isdt@9T2!Er|85*L=A-K%1Y2crVpc);_P8KOaaB4|^5*QuAIiX+%hG^V+i8
zfZY9DM{Y{?gs#h7P)KYffg(F_Fk6*R>4C@Xxj918F>}_8n{EWAvQm)loAF~>^a{Y4
zVW>!3KO~Igf;5ygVeB@lYHfhs=;m7)S`z&%aK^p2AYzQRnh2uu_AQQ$Q>5&5$29Ys
zYnlQ=IO$E(RzBL-o?dE~vm()!d*ZvdlHAx;T1QkzZ5eEywd(nIGjr#>Z
z=H&-L@hUd*X$~}Nx`s~g1Y$y1aYvse`<_p=mWw2b7(zwI)4LG2DSIjJG7zGtBrzfx
zJT<5UxM}t|6(a_00wr269Q365?gC~m!Kyeu3-ivm)w6M!DJ9-Y6Z!%Z!q6&04GZUd
z8B!BCUag$P;6glV-vo}U%REKAM?Le}B_tLQ$pz{`U+mIQbnjmdIkud=ur=?7qKc&P
zTX`omj!hv4SK6#?D&WSalh+9oSMh#u-RgD+0dpcrC$@6%_=qf#2%}LuHb^ccgdRo-
zCwwIG8k;nb#RNr0dQlfE*<&(6B2pn=D1qD%-rjed@;b?&A3*7u(&+EK#G|UCjpj}?
zar`Q3yERJececML92&h(wt^}aszo_o_Q4@f8>_jWBJr;dynIU^US~lYY!u~rHHRg`
z(`&2j3U#66Xf?^*
z)q*-QRXORVQIZfbITAeM0`u@%W((q{A?+*3Jbp=BhMGIBz{zo5KS$zSI=b
zU4zSzE5n;D50s^Fz>M!LUZ`TWN7kX;2CZF~2a6|RF^=j|knW)PW}kek8_BqLpy<%I
zCjn=64)kAf(kn1`)!r83>l$WZzzJim*HMt=G%j`EZP)X&*jHk1`>!~aH{RSenBSYL
z?_tdVX;%r)o4jJoilhM82-#ao?5QblwBkTdAIg%vq}q;L1KRy10EpI$+-<%zs^$2L
z5}a%04rRdyD%P^R6y{O>o>J%eUF1XlJa%qekhY8G&00#qz8kj+=3Wj?rso$kfN`i#
zw|C4?4;`q)0p6tVF_SrxABq()kC-mcHlM_<*Lj@u3HE56Zz+OVwH)96zL;Vu!voF(
zRhAoPYs4F^_^@Z%uQSck(1R`|-s(NM=v=Y(C;3;EQN3D3IMl|Holw3&ZFTVy>eGd1
zfZwSoNns4C)w(ec^3`oS{0LYww$2hjr%f6oPBSRn!Jo}XReNO;ZoH#Y+-{&ko@%6a
zf_g99m&x{joY_PcCDl&)9z%g@L8IyyWDVX6Vb|-7+!@`Rx9N>Z3dwQ3!V1jSNPkZzn@UgH^4qsieC+XH*);cSgmuHA7}P7%Qg%bFC9
z-D6{3`RmpHvie^R{~r+RuX2n$zoaV<6u*}_83@!;-y7j9`*btiy7V+~vHRH;5VQgGK=$KFT(Krj9;pVjq#*~S7fB;2(JH!7Ia<9vfASa}QDW|8b#b)LRm=3)
znwuP#er2Inp=?vW`a`@`9MG6FM~Qf?6u=2tGO2=A_TG8ef8
zUvLe9&-x!DVv#f8*E*=O*8t&cjXYhw@2YYHPV;QKjgya%)%$`g*<*S(0gLx3EX8+J
zVxJG%0@dBv1kMTmd!;QGKFxunc(Lnsnx(>Z4D-4nsaow^$#i
zgn%W()7?}jKjK{M%;=jNod<}`hqE=(s^P^z;GF0W&mIq1@wwI9{bH_kL?UCaT#s$U
zC&OibZ8W@b4zf5=Shyfwl!OM#hHU`%H9FATc$8rFs~
zCruOhM&Rx52~koCxT~mh0c(O})3n(2I(VZL=`%&`5~7JtZ6dJg_fKGb1u%Jtf$09|
zQaFK3DHu-Yb<0ZN5`#`8@$G#%b|xpEh(R&pRH|Ym(Jee;qEv;uGY)Km#s`c4ULR*`
zq;0vxmB3V93KDzfOXA0=s`cTMgEmE%i)V6++6ejD#hfzH6^RLXB8Q$LL;fB^@oJmj
z2qy+mk3OZ80aeaX*_44Qx-BI7w@#d%k(LqEKNuiN0(%#^1g~5&
zM5=|KuCSf@u!_rMrRwoP#y2Gj_aQpxospgr{&~&-GBOQlY=QQyKvs8%wlTYf`0cig
z!-VkwQwqkG>M_lIsd)mH495}qU7-R=uP0k8{d)#>rw=DNMm8NuJlAd>t_p1dYlz{5
zWsRZrRVkjGF|=~Ik_Tp}x_an+yf|AU_gpgHMN3`43CkiQzFWNVyz_Z}-L&n){dukO
z1QhQg2GD5x-aco7G&Lzm?4=LhI(=D6TG!ZZH&fE~sSP7-fHT3gU+09SE!kU9?0TJH
zuT1&v!nZHl#x8OS4z?Vc$PgSAh-@9ZXc##C4y+-C6PAVJdQCj0DB`?}6*^DO5Uve4
zw^9lo{Fnmz1}{p4#AhwIQpFzt5%m?Av;wF#|yd8bEV`fJ1NF9)8Dh2yd8;Zc~5
zW%w-gTQ55Cy%rj!dS42kEEpb4M~`6IPq0wiMTjTmyQ>-t@D$`lW@nGX*UI2WEDZ
zqFvbITv(e(IVm8GlSQrpO^+xpIzs_oj_Hl9Xj_XY0SaTIr1S}<{aOZ!UaI2kGNi=M
z(4bl+4C@l7=?4<^gFP7z-V8T@eyfmv;CjfLlxVU{X(`ARf0*Vfi@K)n3Ly`OUvuAX
zyo@QBcO)-M?@37mJ}~TnX!7Gy6?K%j&ab}TK#N|30(IqqYg$*HE<->U0ZWFK;zOfA
zMEEqwCy=`;sf6i(ckyBGB9pun2N|Qdal*2^(Tc?xt>tY9I|HKNd;3YxD5;aU&0kZS
zhh9>=>Qe9@Qx~%8LGO_D
z+`A5qPSE~fnY8b%_cD72W^cqvF%z(4Tv9F#eB~ve)yd8tzt6pwYeVP#m_&-#B$y`wDcxuu%+8AXPHQV)JM~4sou$RKL1Zv+q2wsnIT7^
zcG~E%35pe@Al>Klb@HocpI6ja<>XNSnv$?c_1@O(D4^-ZY~B?bJ{x$2`6Ri3j2Uoo
zX+;pTw~neMQ{^B9ZWsWG=YsWNuV+jd_rg3~Tnf}Tj1FoBvdDx-Z<4F-SZosjV-zKVrv
zFZVC$aWyo1i@`c|pp#F!@-TB2ZU!Dr1S}b^y51;P^OmYJHP_t-WXS?6*Qv*DL71H>
zNr;xqm-M&>$s#tF~IYv^Wphm3SdChGKA9@-sr
zzTaud?f&+fiiK(_y_afYOLhDCnC7=#@eq@m)JTc*5}Ti67KfbL>y`I_8&4;>%5GFH
zpnHvJxXM4@n|20-ANR<#t}tkK5!EPghazb1Pa77dU*f{x;UX2@cBTRY>o{D3K9J-@2@W!Yt%&NK*OH1dDEh#
z22{vOht{^Umz*uG`t71?FSren`pmLEOC$p>3N3yuYFD6X#9^Hna%#VuyuGv1UW;>*
zgQQJ#p)$T-^ISqrT#Q+8yL^{z#oS9+vd>zm?^$D`%{%_6A=}cAHGJ)2e4+7HtGSDH
zSp
zpUHZbM5xML<$OKx)mRvNO|;_0bAjEfo$55c%Q4AySJD_Fgy|LT1Iek45zA+fDT0V;
zE;3{C{dQ+ZMMpN(`e4Bq;O9piTR15(FVQ^)!6&&Zd1!l-xHCc8__@c3#dy?m@u{it
z*`0*3n}H;{>ySfZ!PIH+B^
zG&|@V7RDnbB>*XVU;ZKGxgF~s3M_nVRTq@?=lU?)o_6
zI&i-$8M8CxKyQj7o5*-%7dE;9+%gNx0xt8xn!s_V0I_l0syjwq;#~fq@AjO@wTrCS
zG=4h{iT9s9w91ZGQ7ZmY)GqM|3jOHV!U+(Uh-Ae+vBlTN9FB)8Uyu&!g!xhC=*mSa
z#bh#P02%p*t_(y?s*P&67tw`Uja7adwKNKEN;?#&Vz&$p&Jl?q!TV=#f#H$2aQd3G
zYtYeSO()*y(Zx$_e7Y67oekW0oc2SlmE_ldC8E~_;r5m}jKh2I19zdOj@~PeMox`4
zMiTS237hPQ)1SsDJ7@9o268vzIf^5C^v&#o<%5o3Ue9)=hCH
zM`qrF1Pjf>WzyI-&*4cMiC7YWbcadIfy{2=w6%PO((zn#p&UD5LP1QSOwcX*6918+
zS9%Gub{E|SW!s1k2q}I?+!aLwrSyDo#-bZO3BAY$&l)p0Fi>h|Aw~Mu*wc}4?&`A`
zIkV$3cmZ3n_QL76H)nu5
zR7+T4o)U4kSk$Mk^hczLZ`kn~k$8zwdT+KECz)1G`|WNi9TI=^Y_{iuQzmo9TSGI<
zhmu|+s;jp26OlR+gxe{ASkI#HkW@R3nMayj`8;q%2?l+i7m^jLdyO?i_LI~-8N!Qg
zmNAzFvsg3E_rIGW2~A^Vycxk?(~+v!7!#NszEC^eySP#d0G;OpDRGRZIyBld@&1(&U4O?P`DJW4cT;dh>Nnl54%rhtR&j3ma>naX)%W#NktY2~!q*
zs{%8oxJmqoB*I37HjhR!A2ZjVA9i{H54&DR@{_d`>;F6?Ir-e|Pm$l)99Ws}2=&fe5o<%%cd_fOn3+lz@KU=IeD}m-zd=>g$
zD29p6f5z9}i+CI&&NOo^I!nPdMpw${607e}@co)_?rP!r6?i8yZ)`jB;W^uV@mUIo
zAV6WS^cpnUQX2GSZ4eo$d7fS{gv6WH>*>aY>ZoF=9T*>+5GAieXsoOgCNH}qhC(v)
z*3*%jKJmtEk3^o#HqB=Qyck^5aFauyje6$x4Y=k@$99nI#KRHH-ulwwotdW?v?w^B
z0T-lw;XK{D&(wO=vN(K7k4+{{E*0-AwS~^K!UqOy|y`TiWaB%Ws;B
zHY&{OK-)1QyOF!?8(Q9?q}*z=BC*diyP*G!*c
z{dWDvU@2;MZiD;TMds~~uXqt(M*MQu(;
z6mA=@H5EO+c2o>Ja7y!3%unF!z!fK~VWXi$J`AUxaDLbhe
znGX4cZy~XtiD_lmcRdNdcs^O6O>Ct#ezMUw3*ZMs-Yf5xx)j!Q9hOIioZ2s>>LOUF
zA1$n0nHz>0LZ7^j!M^$cyDRg8yumqDqkAnCyfbH*@P@Zn$7wKSFv`N^8c|_kJC_&r
z6yc4}S1v}_-7n0)<8mu&9Z;F0%yG7icaaq1Mc1H9Noqt7q=bF@#1XDUWai{oU;6rL_W4qkcFC}2G|uG1E1*!HXJ@bG0|!(ium&Sd3TCcb^IC)}
zd&bOqDx9qzGJJO$pSiJstj6pu_OTPU0e%9I4A|;)$7qD;dJMcyFxD?jmU9B_v>2dF0*F}kp=Ut$1Bk8ifh4a^-uy&fzR
z$tI_(GgHLvJjq>2GIBq{e(dfnKo-slSm}VIh$S{Y$w2~1=%2Zb_^h7>(&(Ve=7|mp
zWfKn!p5CD6tq*G1uMeP%U%f2T15g^!mDmY@ALis&dsezpL}%rSm<#$>M(?{xu{^Cc
zDg`6Xeu_#kH?MkGww?hf4nbV9Dhi9=ziA%|et=Koy(lgAJf^UQkiD)-mHJ(%{rOAI
z7DKekmxe#6a$it?piHlA^HfgQA#G~8ghWm<8FGFS@vA{>?&dUwUNnZ1z
zq+CzoiH@CLKHNR?R;{#YYhN8m!Qif+i$aR+bXvFACLIyibu{
zT8&RDfGpqFRtrUb%^;DcSCMa~N!NnX6_OZHUbmO_c3KDirbEH@d_|*$4t>VPDamB#
z56S^mI+b6xf%67X&zidcR0`y_8T##_HKSY#P2Uv9tQnN>i6w(Cobx&*=Y0?Mz?zVWTa;1PHVosafJh@M
zHMD@zNW&oA4bm-wv~;7=UDARGLrF+TGf1bjG)Q-M&3wl-;Qc<&@x90U7u-M3H9OW`
zd#|U?&d^l;_<+ZwrLhd+ZWXzeXldMwk8l`xMuYW
z={JR~9}5E^0A)e_;ctO?zdJa=*zSp~P5yTlg&4`ggl(s*&n6TT6c0Az`~EPae8m}t
z0U6|1=B(XXxn>I4Aq
z$=_TZ#~en^J}!F`MFh^oZRa3Fm5{CZb-alzdqUWcbO{PqmZvEn@XKV;vouigRw!+z
zlBEx%v%p=m!6^s$tZ;wFN@;OtZG_3B_@00J%~va^{ndM4U&b~MKs(t!bLEHyf)rJ#)}S@?_`I(1G$sKJGIZky;Jeo}>}|_9HFq_k8l)vVbXD$5`_{hUbuu
zklRKBx-n1n$LDy3KDB2Sv9=#~69QpDzb-*k&HNY+%K+e4jv_mr+)RrbMms?;RJq49
zZuINjzi0eJVc@6u%JPgbto?`Um0rsR@9e1VeU${9(KS&}!%CD#QG*a~wwhfTFtLlw
z4fTKqg8cQ-geJuZ(#@MV2?Borc@mY8!NP;y7H?9ZOjF>w8~cA`7Ul0L)ec=
zZzy5%@dl8v4}-E;vQYM%B&M~2A{&?4!;C{)!~A<6BW{WedNGz};L9_Oz5LyzIf}q{
zvfj$hbL^tBef%N>bT@kAv4)m
z5G7$&rJwQHo;H#XQQ7Kz_~V(#d&|xV#Utsqi#Nf*P4E$1e;4$yGZ<(pVNiK<)}}Ur
zVW#NPC91;p^G!nHit;8tIo7zVfNDu8{OUW6_>4i!W{6^C%#GkZK^JpCA<#)2YEb=D
z>S<9HF#_prLZM=MH<}3rQJKw?mRARPGy3bGw&Rz}H%?4e@y8pw{my9*QQiF~BHf6C
zQUwM$ndPcluD+p?ODF*RqlNen5lRDCf5UZwrhBk|f+EgouAr7l*Rf>AlG;WkfzdH5
zUO|ylST9QY1W*gOYg+N`*~(@DR%EN1l|U2QF#
zF_b$bSO>^k|6@HzkoqE-uwH@cqC8d;5Ka}o%s=b1SkLWZWIXF
zGQw0T)y)f{ueR7t+dlzkt#M0WLcZnC8(;x#v@Wn-E)jtmsI7aYdL-J!8X^YZlK|I7
z2>sgbq_@Fz6HJyHn*T>iA0y6fsF_SF%XCnk7zub~F(Y(#t0eoaDaq
z8jztDKHXy>G}RT)~tV8;5I>U1dsHm#(Zsj4fU`T|td<;2Zb|E;PA+
z_ubD$b#{$Xs?>%WADJ?X9dcCDP@rEZ&@Zu?#N%B3%0X5ct$ok;sPOHY3g}{vV*Bg^
z_mo3H64Q8e->e>-c7pTtHr9@QU1FMvfto#a_;B&$T4HwLSwjuVwjMo0zqX5V@%ojr
z&8s0#Y~A_BuGlbkE7?;D)pWEUVvJoG42o21Q^#+&)Ur8}8`8L%y-_!hct1pylt80V
zpGz7O4C|#?InNlY%t>#`fS*HWTTLP2}$f$l{a3qz38Kb?jEfu;Tn5UAu=$g8Sk?
zT-TKJxA5f_zyTHXElRky(B|MqmJt7X!U5z;Lr?`SXghM)Ad{!<6DA>j_Jp!=t_){g
z?c_F3>qx`tEa}TB>+;gw#!Dtx*(S#>EoxwNkWAzYQHB#J;UsykkRSasn8(+|)VHQ}
zh6Jr68-*nl0I84tlucE@T@pR}*v=6(B_U#$3G>A2to<&Aj86c->3iiL9fj9Rbhmr$
zfN%i$86MR$(CpG-`DAidiuHn?l_NhKSb4-6qJ2(Zin}UbKEc6rj9&ISQ*~-kzr~Zp@|YC2*iFuAQ}D`|BKJX`ZL&@B;&xnow{8`
zBDMGZLau*nYgSSUxwfot>A*7eK^Jo_UFS8=F)IWV%PW59o~p__hk5uIPvZ|VKd7!4its&@VGLolayqut=
zIOD^7dzKQ#_#vu-8~%8{tP)W4^p7_wAn~XPd3ix+35rd;?N60H6RGedZ`Apd-(rQZ
zW}CWHpx!>yv7BnX@URJLZ#)Asi2IkNBszb2HRO+*d3Uu)uVarMWKiDPnhFUha_Z4b
zk$84s4=^oKY1L1i(=i%kSpGn55TXn}MAe!1_=6X~k>FvRc3K$WBXbeZkBd4o{lJsd
znMj)lsg&JGz(z>ekM2QkqcZN{dT+l5pn@!2yFhK#6_5CX+jHVBbtdwKvW4Y_IAGr5
z4TG>i0FLmnu$Nns&CdyX#7PUT2=<+O*hy!H)eeizKnVZmlr6Ks?S2QVLNbvG=vf+0
z0Vv~_;GZ~_8hM*=-(Ri;((S$SvkxnQ>M1QlZ|+{+#c+3RG~$8aCo7%HyZ>UGaG;jQOg&0hoemQgb{Oh#B1_Y
zyT(-v512+~O&kK}UI+D`BwEAv9&dH?lL9r6^#yI>l^_sV)V}we%hW{r}C^jN;D$A#b
zaxI{sbh=FB_H)B`N{Ofe?gTTb*mP~60E$1S9pz4C6Y}hALQ$)_l<0@xfqQ>5k3*TR
zD+4Y_)5drJiNWJQ>?bDb-7&YL>kRfo@X!p*!sbw;^TEyH&}!Nk2XLv1g8Sl1d(7{p
zre30E+DVLlZC6|?X8IHlu!dJ3xFGf?6Ba=LI}|oKKNmLXOL@(IvNVH2k*Vlrb}?8e
zM^FxP*t3@o|Jx2=QZ62=azMnbGf3^lP@d0`=t(&Q9ag&zes8qZ*ZsTL-(hli~o*
z>l#o(p1@~2o||57?iaZcG&QoOa7URyXsjrhI3x#CMh?trw<+Mn;lpflO2KvB|1
z53<>$w;<=<7}?O>d~r&6JF@?H@hEX8^hs|n=+`DF0WL0nW!0^WRCqP98Ui
z8UfA~^7<4vh}`8ha0W=XqLOw%F({7k*(
z-atJ@MqKg_$n)6`QC03$)ZhtjkD{b}lWOym&8W$bt&eN?6VI$0O)vMD-h6q#@B>Pp
zGvmiRwt7IdP@RQQoOxrb(Qg=7r|H>);)YB;y_H@`V7p?zsA`sjNrN4ONbT;G3y
z1W*AwWW=lF%TO`FbjZ|a8tb3MWYiZ=JJ%uW;Wx)NfN4s)hK*j+C_hQ(VA4nhY_I9_
zawQUWhT7nl7Jt6ZN~7k8C7K!B_&xX~i3!_LUQE|4&yg
zZ-|^K6S<9{$^7CmdX^dhapB$kUOvsN@ohI;e%T9}NQbO>zP;9NUo#&_ib|dDR4+zW
zuMZDRfyc4y+n>JsWK%Ws(z^85y@rP^f8;Vhg1Z;0x`!fhT%2bLj^Q(zU*5AvBF?-ECW&&Wbj|E(;AG4c?qmrhAhrPoOIqNMVG3tRt_dl%bYn#f^=KS0*
zDKwj05};+kL6Q*4@ApCdEQRuC7n#Z~=VLq=v4c3VR@{A*rVLOHDP~_%RG*%7uzx4kP4}9&o>H>;Gy|x$96Zsg~Ss!>Pn-Mh7+tP
z5riAiLKg-QUU&fG$?EB(Qv73kNGc8#fhP5J@V2&dqH@F5H^E?}%
z#(X}>oBa_c7j=^le;U#}QJ?-9rgWyl?Ipel`@yvxbA`v{Bdh&v8x%f6k^gWI$CPF=Rs+b-*)*JQB^P{&)t)pJyN2o7HE@3~
z|IH6jUdD!ynK4n^$*wLUAB{|?c?bXd)7qbKa*onsd6p~8gRi|ME63y4f
z0ro>O3;{r?qTtnDi@!!1P{(Z(ljgpX+%n@jNA7dIY1q;Kev2Nysd@hQBQD5z>RoXS
z{qwr5vcYg)OebCL!bPsuq(rPHT@QRHHGgTFrTQYy8770^wB%Pn{cI1(
zsxu|A=Vv!bkA)D1g~R&+Z=c#MPvpe4oma#;^=R=dO0bW%`3T)292RA4fP=>kalYCD
zM6_+|wtw#Z{fHYl@g}wC+aDCVftM&vx*?V~4amY8H=eIN@OpDPtE7vNI)O!dDZ|Erug5
z#$Qsaw*)@i)WOB4G9w7um1Qm>+Ns-ZJj<#DxGCp>%so*8z`WYh?~6E0GB}RQxT5ts
znXvdlSsf_6skA>|Epp_sTOOG>yZK&sTG-zVj>oNj@zO_lE%T#^_!1C7jqrLZd>Ac;
zgNlHLv;0_dnQ2#ry~UNB8$@b)hi2v_oWT|x&?fYl!Iq&?eY0UN(+
zZz*0V4L~7~1T0b_&pJAvQeCd+W=Q^Q3BuhSTXW>tC29O}S-P0BT04EON(QnIo$e
ztNjAzCT-}kp0oI2f>=vWWjJ@fa4-1`gb>)S7+y$=!bJcDd5wqZyPp8(9JW8ta5e?7
zCS3FTL?2zqvIjH)MR(tJ#s2;^?UMgRsrGWt>u@atDDB*v+4bSMka)z*SlOyBWLQ6L
z5_Z>X`-w#wKJNElLFGoB4N)S9Gk~|?(~F5c8
zV?0RdmCpctitFnef<{yFdp8
z;Mn)*{$Bq3DTUi#|Hr>f5+c?JUP54x^qmInM>VwCe3?(>Z7N4KRk+xHso2)8!`?EF
z9e7SEQN0RWGaAK_f-Z$SNwv~6N5uvS+O`sUquoE)NFK-k(e;JJaRfiGbj417=PC?C
z-m!j)+(dC@J9e|LpU=Rfe9p%C5M1Dmg~;XK{4nWOMfv_pV7H!-6W8jz;(y~&!XH?f
zy%RiNiW|&CVSblm2$1_7lpPXX`LGlw7y*GXRoGV@`FY>{YobpNeS)xY9&zKF2{QZ*
z+M5%P8K;Nl)4?{*O|G73lZ=NneKX+DsOCw2gwYuBa`G7oBGH28YMnmSnt(=KaIyYm
z@|}u3HAuTOM~Tp|2gIs3xF(bhB5xiNc9goCRn1M
z(2VbfCA`qojcpc}cCr}A6m=M)`S8lv9P?|ObuYkfVv69o=ey>0v-fvbxBQ{tH-X
zj0QJWN@?TSNrZO4Yb;}RFMTQ+f1LoEcy;X5z$WW=|veyrp;_b-hN=T&X{u}I;e
z<{kXJW#4x>rKVJ`?!ZGZ7K|G|E71_+P<9DMMVV1WONjfx{*LYET;Yhk>J|zMo+cFO
zfRCDBk?v0rQEPPd3*wfRq!5W>B{Kwbe!6Q?`Z=j!HS9;~cfwCkpOBaZmqO*Ngy0Ni
znl(YSsfa37d1J~6K6^+(P*RF<;FEb=
z=M5K^|M67P18j*)gVaq?FI*<~4?*Z3!U+T{-w_l776<*H_bR9?WOYang0
zgbDV6-*sYlMB}5JBrop$=*m{SjD2e)usG0FPj1z4`J_W`_oU&4oqXmOWF7--ysih4
z^RA@f<;bCBaLk)lA`lv-Osm=7CVvMJf`vk2_5j0QtYv;FL}iq(E0&&oH83mq%-U`%
z93(9s{eN&Q&W8)W%xy$3e?)i9nxA<6z>|OT`-|t!lerG*3M~4wRj$xO%cn%1xsj2f
zjBGBRguWEDWrN*{l}RQ!A8)0u+i3)YabL_Fd
zFR)n>{8~8O7Ke?GcQZ|&!jae2wQU>v)G%pgz*RC;d|CK*$zTy0T+05VT(;vY0q?y}
zn#*4pC%d@;A8OG|TfcT+xWJ127{Ia+OJ(_g=UC`mGt}hhipucV$Tz*X2Uh}{*O?A<
z)$2Ppobz?a*`3rC*~(|eAd4QUok^&!y+$jZAn^Z(1u)xXS@%BnnzZvdOog=)Wd#KJ
zh!Y|F)z0?n&InG}8Kk~xNoKuOIpA!h%!q=Q^g1;udhtIb-nsZj
zqf}Ep_X%uf>yT@A+w2Q{-@(|j8>27fRPzcZ*CI31+*j$oGvh4iS?6-1q44bY7^Qdg
z9Bm+KTx7OiIqnnurVoryu+Q2XTZx2If7<7%n9sZWIeFvs8zG(k7pz8YRa$PfK_~l)
zoBv_S6IkD=a$|{;aGxu3sjoINjPdDopTgA)Xf{G4&9<_V^mO|Tg{$wBTquOPqJ*eP
zli|Ip81f(yE-!yy;>vN7Ff~2|XXWeOUNhEOl<(DIS8sj=qMx+-T@cX~TR(Bi*Keg)1$%XAi{;a3ZA08rPE6!F8r9gjt`hcu)jOCkkC3
z4VzA~q<*h)HRo31OhM9rfAP3$zZX&&-DqKtQX@xPKl~qON5nWd2MUjXc?EUV~wmK-rkBp(4OOt-!ITQR>nS|A;)wt|5
z!bu-zG*ca+S0Y@zS|JsQPM;oN`oVR^dCct-oBM9|Q1pV1w$()cte~p)gq$>%b;BjM
z$GrJ+_iN7WRSmSXr8a>#RuV8?u7IP*#WGl)5An({=v#?Ekt3v&-NKkymxPggD@kt8
zIbt|YRF%h-`(j$VWD>K_%huD6QZ;1@7jqJ78#F-@5CD0Ucmzjw=puD51BM%xd^t(f
zv~3sqt*q8_^cKD+z4XkW{-M;W?wBToAMBA;FdDSD(M85y+An
z>EKAX5c06MOD?M`*@Ez;<(rY9q&x=LT876lRT`e5^%8ye(QpQW3yUYqY-B>qte|Xn
zLZGv5FnD34&hQ(F0eu`_7EI+5Us^mYDMPwrQDS`5B=q4TSrqc1hgFFyroq?#BZJ;N
zwwA#`?<_nU5{aje(UaX2*hv~xV(-KekmyUzH36NKwREnpP^}u1h4h0%m+l<&{ve+U
zZ8ZQ`n6i=E)k#*X4|KBoiENx<($=~^DlrOUN8{XwgvE(f9#CY)NfXB;bvsQozJ~Zn
ze_L#zAu>3+0vM+qaB&9dhlcU!#M_<))8jy>nA#}lvn1+`VnK2zhg<||WcLkAgcUVj
z@j66fk=Dc!3Cxa-79=gu4UxGthvjb0;IhBo4M+@0dbP(j<&))Fk6ouDukj`GE`ver
zLsu{p9lqLlGo#*?u^d(hzV9OGTvBJ!h{VfpCAAv``x5E(kNlcFRe2Y9@Ta|xJr7*l
z)XTH$i{(++ECnE;|K~xjXBUzQcELyDaPg2)==f#fX}O2UEC^lk0WCob=12Dzf?PD}
zR>VUC<8lF|qE{76Fs4&^2Y$ki%9c;DY1D0qui1D{L_1?*J4A8Gbd}~?J1xGr!@edh
zc$<@DDHjU+bX*6YL?5&_Qhm}9FbVA>V)b6RW;ouFYB)AXIVg~Tz2#=^D1_>2*0d0lfli~xYj
z-9{T@&G&FP?qUu(RsJ1$z55{V-=v6b%)cKLZ62r0u8mZ7_eWE=V+rCXwms5)E(|?X
z47VlHYNr?S`yh>t&tNdw`>DM(aP9BiuF-%~|Cq@{aTuNx#*0T7ynntlXl)glln`6`
z3hu>)YL+y1U(|@;3X*yDqhl9|!-DsWNH43#4K;Utj%No|`I5_#1uB;^+ce9O%?|C^
zCF-ovdmr9RMh7#Bo0c(P&4*>Cm`3uMWQVF<#Ev~tX7DV^i)wHXuaG|fX8(y@isO*t
zsVWVz+DwvAy#;_XJcjp0&L~<0sPv3N?3x#^YD@TM6^zkG#n*(?JIz09>pnZF}RW@soaGOrQ>_5uZZj;vg>H
zQuH%vH%5+2cc7}{%oaa#Z6zRr>@QS=WBwPRaRA!Fe1_|XbgzRh
ze+r|nMfEzU9%SP?zP>X^A}oakiAn7yQ65T8I5~V}rdUN&E5;Rqp-Xd_im#R}@~1pe
zUHZ|zY6fZo<2F&MQIk;9ZNB8FcZG81W})zX7GA|88uREl9CL?i@>%>m~4yy#ii$!nVYeey2K@*+KFdV|1q@R
zVGWdTb;Le4*s-OOm4UBKX7)>tg3l7C4&MZL0A%LkOyE8np1&x>o}WA`m|Yf&W-(Y=
z-aOw+>3#;)P|cWur-EaFz7QaxEz)x#HMdV
z3atAQt1)_p0I<6P5!~Xfw!c)5ejPPGU~N4efuy;m3ha_mQ~RMUpbOxu^`+Iei;-I@
zknuv92yv_HzsKL->297SrI@a{fz;))%k!Uq3FF$5+gRJoskEFely+uE;ERZ-Fhxl!
zl|LlA+keXGZuq*~nHiQsx9n_AA6;oUfc(PkP+~LNk$~XY6&e|DtiLpDQ@`J?rHN0d
z3FqTTA>LVPd
zxE5}WM{FABoh!$q2^qE`%r{B3Yjn@}P@an05t@I|pn$~ZGr`rGq;t321qj(4ST)N}
z*H+vt|45d^K_7vS;ORNvfmGDB9s6~ONrBj0*z<#Ge90|4ssKjDY-@*C<8M-J9{Eau
zL!J>c`T|rlomML&+*xY%_k$YL>y6@B1$NuNmf{AE@~P(W-m8nFdjLzXfG5<}o!f7j
z8NhR2lhcewjc8F%q0uVMCcd7QxEeI
zRY?df_R;y0cMMt%O5Xf+qcNHsxMol@Ht0Z+Sfk4Pr4^e
zi?us6f5f5aw`ta8Rrw>%=55Z7t>Q}2_)K~^_k^sjTuaTmaeD0^{K&fblvRBqpsP!j{PCh
zYis5ynoOikR4M?i^C_spcn0Ix*?oRc&1tLJVLP_@-HUf;e1OTkEizHnr7%J^23m3%
zuc>^(&%8RUDH%4#1gqt`=iywLt392rBVm1laIgN|C5YRgOh!t^+P2R8Vw(m1+RhYl
zF^5+rV?Q1(0qVn3mgg4B7aMcph^iB#w@@w8LxfFq3C7K9rlj&3$POpGq`d<`@1mEp
zkbQqQwQ6;r!D^>-iqRA%(Tg7=C~+wx>#mlck8hK+-rZ#D+vZ2@+gXT{@b<-6x$?bd
zFvkJ?hA*k|B%MYF{%dAmKC)W)%iGrz<&|@B^MH?pF6MMT4xV%I7!JOAoR!qA!gFk;
z-ah(k@}vE4zEy1CS)wG1FYb<9vfOl0U<2Rlt~qgE{Az>Z2#qyUh=WIDZ$
zPw>B(`z}p_6b?Zi3#svK^ceJL?NpxpaDUK
zkJ96p+Msp3HE!RLciT4R@oT=iUq`3L=n-1%3FQt0%rPkj`k2-()%*7KV+NjWBrkMn
z2ZH~x+;%=|d_fQmy#z3k<;=qj$8htFzTZFT_Ti!Vza4E0PdHW`5^HR1oLxTR?jJ1w
zqt~_6vhk*)0&t^j|42w^Uz9x|SY!E@6jAw~NfEMByBkzs;!3p1E6V?otCCvBc-||eo@17$->L=~gRQn*MXDHGZn?x0-
zv!`J(QlMGau3_{cA&~Jwu?7P7zsq&`?H-kmx3cRP@ojbqIpi~sjV|VFmHT&vP?;W|
zOY1CiiKw-Bn}8BDF-byHLKJcrbTLN+(Fp*{Dni*cqH$PEir?eguyooF$ls)}gQ57|
z+W0oV^8^|qz^VWl0J)_F^K;qw+_ggY^lgcEH-OtLfJ>#Qqe2Tbfu}5Q-oiIpwkL!wd=FyV~?9k4e3mc+bUy?NCQ@X4xpeplcbLPVfQAJK4$Ho8+02q
z5_8S>{WM<+y?;2cF+nryQ%=lEwYsOCp=gD|tVS%-^D
zg6i5~au8=wX#PmdO5rW0u!rPD(JkgDTMUX!#gTd!1D(Zu20NG)V;mpLAlpQEy}UbI
z^y(%}tNi*FQfTaNSq;XLhO%okDZU$9()=c8SyWK@t_1b28c@*S?}wyN~r5jG3NU7o+l~(wQ$neHWu|O5XKgh|mIT$EcF^E3I*@*8EZ8imR&E|3EA=
z44KGnAIi7>;34|VB-zxrq8o(?VKzQ4qWnsnHyQX+@DV&>08G&N#Sg)Qg1T7(jFU3uP0oDDB-MvpKxK{}7)uU{
z)EzG#w#Nh@JolS@?|<-wk=@``ApX6WYrdRPI}hoinb6zR3wXnHljGbSE){Po`7^5l
zcJFP07m0o`j2%tlAjK7&dpF1)=n41;jsgWr$N9zNb6GyBW??u)=_9HH-WYSu_ra9&
zQx<<|DEl(>Y!_u^vz_SYglSb8Ug&s%}Ms|k~lQ&u5@$EjE
zARIux0g#sv1&}0cC|mn)ZCdYxY4?#m}T|NyPEUxJHLd~BEh$k0Y<>A8#}q0>Ft-;K^*6
zrcU(~t_OOFaqj*CN;k|N|3hhMGm{)4SFVt1i|&|zl1lSK@VsA|RR-k)Y7tsqoxqn&
zf|?%CZz!M^(~ZN9n2(bkvE^z1n(Y_?!vVBW35rY=dcXV3p9}MGvTWQN|4l~@R{K@U
z+8b>Iup6cNx$^|UU?Me~Pe>f_sXQOSt)!9xNkvYR%0e_iq50|#kE%Er4pGxXsf7dP
zns3;Ys}2h~jasCC2so{m92+HuJ>;YSNogUBD-y0o#8d?%jp^xpL6hhn?@2fm(c9Wt
zMB9~boL{4{{*LJ?qJe%BK#=^T{MbQ$RDMY&kSl(?an3erRG;V=OX+CmJiDFl5U>fIUs5P>Ze2Qi
zaviC_^B`bM=&qR2zB3WzpT+#TiA*#7(Bk+$qNDnRMEio4=B_wbL-2y*&=T@_E%~Rl
zU~%rbis?(0V+L{kB1kQYAr^$=oP+@ryBV^h5=0iEU;ZXyq)`_RW|>C59sIixE88is}3TOlpQ+`vH3H%L#9q=Sqz~0wruic`7s=
zmd3)jolt<1m*!UbQd23}Q(xLJb&$OezdFo7#xrRY0I_5ixzEpIjyK18_*T?2QeWD{CNOKIyiBR9fuQ-jVL)ID^J`wL$?_{36^fm?89ue&_3Jdhc<%5e
z^E#MNu{#gRFvvtv2xXi1e9mf?O@usuUD_1P%mS<@o*#4w(=66^wLinoCutTQHR3y
zVJ~O@^Uf|Aizp;s@JBQgCY(@;qnLHGF9q`XNf%3TO4$mjFNcbBd6GFTBJtG{m^3(g
zuvCN8M!stgR}`vz3%oyK|4;MC{pAl!c4AW4j6a-b7}PE)C5~3T9W){RSV7J0ec?pY
zD17$!PBQnqN6g}74@h0bGX2m@LVp=ynDHm)hB0nSF*xeic^`B!qz+#>J!!5SGhpsZ
z;pQA=x|Y~VwQKa}zgcWFkoMACmWkCsrYJo;@+o)s^TXk5)v6hnRQc4G3RYvqHYb|v
zUA`CJR_fgkdntgmfp~&~^S7RO42tQQ$QCL)Z~jU6X*2bdJ?Ao;-*xBta!(@9edTG7
z&7z@FV=>mGdGM`T>4K71=CVvSax;85E|Z)^Mpyb$CA7lzTxXmQGLTnN{4QJ1rfjOx
z`98f88S~cA!}Eg*g7MV$?VTDE}H8naYdeq5oqH2+YK9O^if-
zMOYl4617R1xIs&XW7L5Sc+cd~*xQ2Hz)8JNFm8{ZE8zIa;8XepO#|bpISe^fv(mp0
z`WUo+bNoC%94gSDTHoRff~o8^7x6$BN8tD@5oAtfuH7TSBOO
z4LLl#$gtE%^sDFTgaze$kn)8_u3~!l<*MY38l!=K(m@gC>d+=uP%tBW;Yl~C_kD@6
zV*MPe(Sp0%V@0|Q3Cvn7XS>AAnw`P;G}+#lCtokJ@&Bz49U%nC@e1;n61_Fvm;J@)
zx5{^8-CsO+EDef1_kP{C8#b7Gn8SK{iMZT#&o|8HvIGtaG!Pz!l;0I;Bw-QcF9CXM
zyxd^u;2%=EdX+~kde3l$js{*fZ1h~KTOaSviL^5e5&!FL$*>&_d`0b-bin-OYr~*n
zht*i|3r>sQ&(+h13e-Q|dl)`YpqeAQhIotdZ#CAzo$wsath-=6YQH2$MjiGko#_%&
z^&FExdDmNcQG+|-*q9h+VrcBkO3!ILRgcEl3sht99q-)g1_%0qotfD*8u~j-2<-bq
z1s`lVr1RF094ogRa-2DV@k1y63g7MUR+BnO2@(nxM!=KQsrn^#j
z=1>zZ-Mc+JoIp!+YrWNXKracP@)M5}1gEm$krCtqnv)flVj4{STkd42zG)ND&UtEn
zbiDV)fWWRo%-g@Lm6&SjJ10!P?-xq@o5(I<`w3+vFvMw~h=}&EKX|1vXeLbJ>M;3a
z>We=IPdMLnmYMgwnieHY#ZWKQQ~;pDmUE2_T<`w$(hry33|tlhML2u9Mf=V~QvL~|
z@k?R~Py?(;y6bF=?M$uAFiaswvq)#YbEx|%D2#;lbG}+`_uhQV^4VfkVhoLxjwxy2
z&8fH#?u73|VIP!SvbTO5!i2zNjj{>PH%1Hle5hGOFxDDN^<5_JiY`m>?t?&hd+})J
zWALU}-|H|&ifdUkc49UHCri=(FGA)gTNB~L{TP643dDZW94pel5GsJ@=SK~}CYusi@O=U!pUA{qn+ANtDe4bG69iCsDp(o0nBr`|*^b#b+fxvpG#dJf1^lDD
z*L9>FL4%k)6)cu_C!k9(#<;^01KNZR>g~q?Gd>^;v3s;vJt_+dW^9d5xWhRn$)3EL
z!gdXq^v-a!!}o8d^=iV-Y6%#(u;tL$1Cp==H0!N8%yu+*9qxhf_JYw4%cXujZzo>Z
zboGi`BR9cfPiS@M=YWe#lIK#Pp_5?jMcI&K#n(i%^1OGMwq!s}=XXr9X<<_Dd+ekg
zz=txE_B-bjvyYsX^diS3dJ{NUhYnat99N4Jd>r0Va1+A_bEY(F@4vBiE;}&Q#Ec6=3|u6uBtGY1VxMFPfM&Ihe7O4{+n~YY4P5?oXC_Ct%GN)N
zzPRhEZnu&7EC?A(C%5$B0ZViXj)445^&$>)`*^a&7sdw9)6e%FJ|$v?sh+%Z^w_Cc
zU5b@si7A02bbwjWpKvB8V!BXZ0X~o&xDyUXJeEWBO+_z?;&p~X7g|ST7}9Cg!gJ5}
z{$T-f6}e4T)^jsnekkBoNeJuGqdDGd!R@JbSQKY|-+-m-H961x%W~r#!aLTY_*C
zv51*EnM>-afvq3UYH09V1nE_SL|iU6oX!#wn{7{4#__#hNxHQ7ou<78|9C;l@017d
z%^dWw!lnCCxcfLeq9|FfFHaMNPN&su;nyzbQ*#JSwj@>fR!*4cb$z)lG5xNj!3=SA?l>qx(zVbQw!E6*`&o{)VFcr6X8$*PW#J6(
zlP3xJ-y2V+u>l9$0JJpMY{Ep$cu>+{`lu&X0TN>(i&QBYBQf;Ce^%hgo?M6rydy!y
z@Wm|)n~YbPULl3n`{Ib5I^S`*d#Kj=o#jYg4B!JwrU_oGeS0G_({MV=tY7PdU-bQj
zUNxJt{M}>MS@+dsIu8#xiyfJeN5ywTxIuCC0+w37n!lEgIny!sU_lDYvA{}_X*dSJ
z-eeBHK8fpLsq4jPj-ioyil6tP$ZoE&%;VTftGv!2*sl+0oAyglW!rS%v?IewO0o{3fxkss+D$g1~`Iy(Dl*6#G1{V
zL<52%Nd8-8hjOb?ro;2Vhooj5Z#nJV{wBzYMkIf|4;#^@#qm}sBpcLhc+Bw;h%zn;!
zzoc%rw~jP`X(_~PrGs_CmkbN<^S8T;L0s5#5{Qeq#y#?*UpIQW|5(XS8f;M4aUP_z
zb_mWN;i#eXIr~L+w1>FdO%*w|8q5mNhUIE7HmKXL8)Vn*)XG()#1~|)&uJ8>%QRjc
z^boYEEBlte>5GjLL5v4867wDr^YcSAGUrVK^)73)e-)LMlO+s+hiYj?)*xS5GR;X7j8U$7uaY5Acqjf1J-k%
zx|q%xJPav_3p?@75A$K!#Gv&r`A#uepO?xw5*keg!8N
zmNeGl;Z^1uw*=lzU@SsgXSJS8+z}fRd#?U^J!e6>P@*=7DGz@1yRzA7F@mQ%H^YZ1
zjzNh)F|7XjWGXA@6@a{Zb8ckC`nn*ULh~y~H^X@;M(R;gEaKez
zbcQ6frPg^9)W+k1mRf>`CE*SIB+`0_kUB20EE
z^VG^vXS;T%b`$$PliFb8T16ll81fej{lISjzH+p${*zzh$y}fiA~lZ`!$Bcci8%q_
ze7irE?mBBJ9?MdvW}H2m-a+Bnn--iKB)(?+pcXEJ8@D!DS*UF_{=-y?M!X^=n>tG>
zibAq=tGr)W(t5`GbY`X6u_1I*3HRfG=NIo2?f3jfz+LET5CuoiiF&W)9M7CrdA@y4
z@lfkXnRyRzWjk1m5_y`c9$jfQ+P!sWSj5?GJd~I@Jc`7??W;Dy*{}PQM3?T-GmJPo
zHEK9I?!(t+yN#E{`$DPAQ)h1ut#@t~$p|#@yI=G??5fVjfF60E@CkYXCSZUa9Dm8*
z5>u-Vs-7(&s?sk$Nwg_*8MWI2WML$LKDAT`FAN8Pc1mV)U>V8MSjH~fY1Vh
zh8~5%CgMrdYobTh=+nUyGD`)+Q%3jTE}9b#&6z&g7eYTM+>zQm4wg5twsxopVB{^
zft0%KoABMbe729n69D-Wi2Ge_+LdIQ#7~r4Ft~fUt$Q|j9Gi7UQ%OF5
z5B$Z?PaoU~cWI+heAfwg7|LeV#el$MgT-?d)6I@IMmb!zUh6IdkZTjX9fm~!Sac4@
zrOxM`3ofXuLnkr%fn9OuXMOn6T$yQq+-uAFmD2e&0&yu>Iw*YwUokPnuM+`Mst0$%_Ya0!Cch#qMKX7D0oDX98S2t})W^e+
zLSrY6j5{q#>TSSf$9aVkP5`(Q{^;J_I0&9Unh6u=c}6Nn@+FzR*GJSfM;9~N*Cqnn
zMHKR{V-t>3;a1+8>)s;*2vX-Uk^BcJ7!;h3QR-#eZMO5?Y5yV0BebT2A}YB##_#&u
zgYnendEMtiyQVMk79psc)@y0Mt9QoAY?vT?37a%&uBLymjRz(6(gd{gu|J(g
zB;aOzsC>ZUk~cH``~Ob(zbpJ-mHzJ@_WSRlm63u&`cnSlc#{EejGeY8HB{ryfpDSg
z?ktD>U+DU5L!A=K;)9!jT4pb1v~Q0f_%WLQYfK2tq-|Z%;@wzrLV-r1>~eQP&Z_{d
zgBDy7>4>M?X2URrGTRw`?H?uq>iMc|6oTVCuKV|I{$_L+{h)-{xCsNJ^%WXB@dHU70hN9AA|39D
zY6nyQJH*VI@#a0BRT3OIvtK_%-S=?tAV_{ZTKP{qAoP{o6#T9>o!to6$xN6aTk&775yE(e@Wn7!JU_oWa8kxhg#P26
z5WB~+6%HY2CQJ~WE60T)wsuXF!1n^s&c_m^7w&^&MS&kQ>&2L<3LLHC=7lZZ*GF^lDMgijV{2sj)~r&^4uLV$JyR
zHJb+2h#&MVXlZUB@9i1}dTTt5e{-)JCR=hxPuwiZ%%FjcF`|9{{T+QU3wwKrEz*{G
zKjL?|0Pw}qN3_HD!p{d7{&juuQPv#vhDx)a8rsxnj+otWGRy+LrF2VC^KUnL-vqtN%riM?xM+-
zZN?s%VN65PW*y2F%57+~wjg7fVT@&FFwb#u-^cMB-ygpJz%|#L*L9ws_xXCiuk!=a
zoQlE(iwhP@8X|>-UX(-G0X5Ca6~)n2*&6OGe~;l@Bl1RLn9Ze0-MMPclk|#`+~s})
zcfeT$+%r{|H>cT~E!s!VhgJ6FX^@Kh0L})SvOR_9F|9-SSRO=1zi*x)I$A`lnv?4?@$62gi4IedPJZI{#
zibJ)_wHRo#2J0^TjmIW;rR*(WIHnOsQe|~|O19W1ILrk8DXyqb@L_6fXJWqP_Socr
zI67{llM}b2XwJ~>pNlci;`HTd5nLN1h_o^XZi2WR%mv1q*W#@IO1JPvkZn&nRA+mo
z>6$T`mM#6hJtw$?yjNm%E2K*Ym*(UvTjb;8ckMf(Xr;IGm*nnLS)D@*WaE2#%`lbn
zgOC*amk@N7-S>fK9`7dKi5q0^lRb;4j(8;fd94qxY1WJ^6mUW#rW`
zNtBFO?9FX?-zn5hot%IkOVm3iI3i()6c)qMa%F_jMEC(zw
zzg0x%o#)OxnJP^>mMN;yWDOvmsQKEi$+5_Z9P=z?8Kb4~7^XR}sE5yeHX90~(@d-E
zDgHu9SW+2U8tkhx7M2yunZnspoX*rw=Le+7(|pP&UWd=wlN@S_M{m8`MaVs5>Ta$7N)2pe
zwlo%oe|GGw`B`=Mi)&=jd?T}kSn~LxcYNP{p!Ccu8g41^hjpQ~dj&hB43WYqDVdPN
z++I8*h?cNk;l9aR(}@X7grL?&L(`kqe?BzRqoeJRB#dL-^;FIUSHa4h|9~YSx&IPC
z&IO8y-y>%hA?)zSelVvCP2!7781-1%(zfUnO=D^EJU
z^v{vJOoD}(V;JDUDj+xPJv&4q27Y&@>3%KEo|;1+B1XCr`|kt1^Tzmf1bo!-PQF
zm?FD#e&K<`FZ@_Nr)s2~*++D47D@(mJWz=v4!`Da@s^u+Vh3F!842&HY5N@eEY1nE
z+uiqs>$H^3aoPXwamQ}83Upvez*z&(XtwWiq+IOc9g?bF$B9i?Gk-L+|IAypaDZajCA@%?zw*sd
z-Lw_ZzS@d0PP8Rk191QjlJAB)sP5V@lx#@B(rFz(VHyzPki*z=Ic}A}ryy3tzPZn4
z?4{7?wr|TkXS?JQvVqT;h*h0CHJKrK(gOJ?;XRd+>aV(*2Q2FidFoo$Z6R&Khw)0j
z(SA9E(BB`g%M{oX?W6&o_o&@2Y5$*nwhh47;j#fJPX#3yP1e^NPPWl#T1@0zAz#ps
zW}i;f*le-$hId$3Vas`MUa+40yhzqV5s{j4m2YT}AvS%`!h3=9yF_D&x3u!by+G+f
z)(NXzg>=2=j{~{CgPNAiO1nF>Lh~oOEZ^^!_?Ll648BnPb$47zQ=^4jivjWHvHevRos_KFyEV{IDs+(+Hsr
zik4*6hQlW-p#XI&-<{eWnEmPlY87fu*
zpZHxAS?qfTAzp7?TGq?mug|vjdcq}up8`n+^_F!{phIvUOof6aB@g`pWi-sG*DSlzjCSf#ArzLC9JEkEWav4c_5FJva{&J)#s&0tl>|mC9L@8#z_7cexj$7Ph4_cW${X{}_
z&7Yx}$YZgm^}VgdKV4~wt)GAMD=mb#@VY>1_X?sKO6z3GfY<^8&PP@Q3?J}qlSn<}%YQqHS
zefmv3;HP3bgu1Estdv-fb#rGYSANJnZGL?D)%#h7b(JHAwZho){!LdtLO9Pen=7)+rn$Hk-7Sa0hZOf
z{mk(YiT8}H)W&U5-N~{nCV@PATCQX!EIizE=$i>h6D%Rx^Y^M4&E<-5Y^YHVY}@p+
z!f`*&HFl)T?1-a*Bysi9JF9Vj8|}XL+@Roh`9wkQ
zdZ)L-CZKaJAHU=Bv43*ntpawVpgl+$)@1?G1RHAOsD;^|u2pxHN6vlz&~&NFp~j8&
z%;TLPa|OTTQxf+%StV}m)7yKZ7S3@spU5>W`6$is={z4ebG(^gbaz*9dJuO9Mg5=k
zF|8weZ}wab)$KFI`9$iGGtjQ=xrf)CU)@l_xr98>eRQ)oS8aM(*&<&$;9t$)YwS1r
zrj{g)uC#7z(yB5^+Rqw`oOmD4Tkvt)ZZiXq_J)_N&?`!M%FVO-L_-H_0&1G=_v=nd
zd;@euXNpV+e{-#X>ediOnt%Dljm2nW_6%H-bG`MjrF@N4Q4Ec+EP;(R4Mj3W>qjI8
zaSYgE>mOyzJG8@s+fuIsa_ccPesGXqaPK;NFKep6=cZWJF*rVo0~U
zFs=Q8RH`8jVQR)Ib)rvvZ=nbo}pjq1~(z+f|^%yNvwm-L}Z@laEh$X#|`wztH7xgt&gX9W$a}h
zqtWX6$3huLB(W
zR?xRJ(_)5!K)an`%C9TeA0M9uOmR=s8X&3Hj3PVKsE6gdH{fadHcq5^?kri_>OVa33c6dc$$@
zvv;JUNgp5wf#cb)P*a23b?ooXh;46I#qOM&_F*xZcOPu@9u^g>R|2+MvX`cQ@|aYd
ziMamId;*OS^Sd~v8fcnxz2A;IFhlo*n|51d9QfV_0{t;!e$mKIXYAUlm>@d6RmxEZ-6h;$YV2QlfohdS2`(OR7bhlq`IRy}+_qum+2rWm0+a-z5
z3CPZLISs%!1ANSB&|XRy-Q!^Nt^32Jz2G-Hg~WYZb5Nhi_Qxt>@I9q?S~dC#pr+Z^
znoyRygzwr^c}>FFOk)w-;S7cCYw9;tX>;8@)BX|rurkG#{=1`S8h0LPOg4dZvT1k!
zw38;`5!4s?gtw-+VR|^Tc`d&g<+MawL(+dpN7IV2x?ogAarErj7~GJCzLE94G)6!b
znw+b9#iYY(;8eE;INfQ}*15Wg1%HRI5*mthr?*K*@BLAz8;TT0;7)|>7%WtwpAx9a
ziMPM*Zp<;)g!_An0m-*3SXJvJZ_(38Lf~ib*KMQXgut}Vg*h1Icr^{-z@z-fa&9NH9%Go`3$BVc*1kkSEsY(Pcs8^aHUAmODH{2H+XNpxd$Y
zK%u{^V$ucs{B$;B-3h!uWqU_uh~a!=wi*5#?Ge6MAu8mN2O*@
zMnd!cpyNd*Na4SVpf4sSb_3vMX}_SvEgWdMuCZ3sOLu9X$%C`%02a9T(B0DINaxob
zn$RL4&*vU6-@q6`MdXPRsQ1$J+k3V-gQbKaQdd$ryaEQlS9&jiTGIX>)Y3!n
z^$55jv_7Tvk2eXV1T8QdvPZ!C{`?OHAEIcDm(dVVUcMbgll@0fhzYR%hty=3x*q8q
z2vlkr$P3;L*p9IhSK~kKo_Zd$Yf0_Gs-CV6@PJ%6Q;Ir&q`7UU!9jvblJa~gOdceF
z+x`dYsSY=`onL|eJ@Q07@zV^WRxQC~5(Y!Wm9Fr`rBAoM7&73kF@v@YN_cH;bxdsr
taHqHOK^z@j{`jrv$DVpZ@d}Fx*&j~3cRz!)gFqmVxvAyFYU8Vk{{.
+
+package admin
+
+import (
+	"github.com/gin-gonic/gin"
+	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
+)
+
+// DomainAllowsPOSTHandler swagger:operation POST /api/v1/admin/domain_allows domainAllowCreate
+//
+// Create one or more domain allows, from a string or a file.
+//
+// You have two options when using this endpoint: either you can set `import` to `true` and
+// upload a file containing multiple domain allows, JSON-formatted, or you can leave import as
+// `false`, and just add one domain allow.
+//
+// The format of the json file should be something like: `[{"domain":"example.org"},{"domain":"whatever.com","public_comment":"they smell"}]`
+//
+//	---
+//	tags:
+//	- admin
+//
+//	consumes:
+//	- multipart/form-data
+//
+//	produces:
+//	- application/json
+//
+//	parameters:
+//	-
+//		name: import
+//		in: query
+//		description: >-
+//			Signal that a list of domain allows is being imported as a file.
+//			If set to `true`, then 'domains' must be present as a JSON-formatted file.
+//			If set to `false`, then `domains` will be ignored, and `domain` must be present.
+//		type: boolean
+//		default: false
+//	-
+//		name: domains
+//		in: formData
+//		description: >-
+//			JSON-formatted list of domain allows to import.
+//			This is only used if `import` is set to `true`.
+//		type: file
+//	-
+//		name: domain
+//		in: formData
+//		description: >-
+//			Single domain to allow.
+//			Used only if `import` is not `true`.
+//		type: string
+//	-
+//		name: obfuscate
+//		in: formData
+//		description: >-
+//			Obfuscate the name of the domain when serving it publicly.
+//			Eg., `example.org` becomes something like `ex***e.org`.
+//			Used only if `import` is not `true`.
+//		type: boolean
+//	-
+//		name: public_comment
+//		in: formData
+//		description: >-
+//			Public comment about this domain allow.
+//			This will be displayed alongside the domain allow if you choose to share allows.
+//			Used only if `import` is not `true`.
+//		type: string
+//	-
+//		name: private_comment
+//		in: formData
+//		description: >-
+//			Private comment about this domain allow. Will only be shown to other admins, so this
+//			is a useful way of internally keeping track of why a certain domain ended up allowed.
+//			Used only if `import` is not `true`.
+//		type: string
+//
+//	security:
+//	- OAuth2 Bearer:
+//		- admin
+//
+//	responses:
+//		'200':
+//			description: >-
+//				The newly created domain allow, if `import` != `true`.
+//				If a list has been imported, then an `array` of newly created domain allows will be returned instead.
+//			schema:
+//				"$ref": "#/definitions/domainPermission"
+//		'400':
+//			description: bad request
+//		'401':
+//			description: unauthorized
+//		'403':
+//			description: forbidden
+//		'404':
+//			description: not found
+//		'406':
+//			description: not acceptable
+//		'409':
+//			description: >-
+//				Conflict: There is already an admin action running that conflicts with this action.
+//				Check the error message in the response body for more information. This is a temporary
+//				error; it should be possible to process this action if you try again in a bit.
+//		'500':
+//			description: internal server error
+func (m *Module) DomainAllowsPOSTHandler(c *gin.Context) {
+	m.createDomainPermissions(c,
+		gtsmodel.DomainPermissionAllow,
+		m.processor.Admin().DomainPermissionCreate,
+		m.processor.Admin().DomainPermissionsImport,
+	)
+}
diff --git a/internal/api/client/admin/domainallowdelete.go b/internal/api/client/admin/domainallowdelete.go
new file mode 100644
index 000000000..6237e403f
--- /dev/null
+++ b/internal/api/client/admin/domainallowdelete.go
@@ -0,0 +1,72 @@
+// GoToSocial
+// Copyright (C) GoToSocial Authors admin@gotosocial.org
+// SPDX-License-Identifier: AGPL-3.0-or-later
+//
+// This program is free software: you can redistribute it and/or modify
+// it under the terms of the GNU Affero General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+// GNU Affero General Public License for more details.
+//
+// You should have received a copy of the GNU Affero General Public License
+// along with this program.  If not, see .
+
+package admin
+
+import (
+	"github.com/gin-gonic/gin"
+	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
+)
+
+// DomainAllowDELETEHandler swagger:operation DELETE /api/v1/admin/domain_allows/{id} domainAllowDelete
+//
+// Delete domain allow with the given ID.
+//
+//	---
+//	tags:
+//	- admin
+//
+//	produces:
+//	- application/json
+//
+//	parameters:
+//	-
+//		name: id
+//		type: string
+//		description: The id of the domain allow.
+//		in: path
+//		required: true
+//
+//	security:
+//	- OAuth2 Bearer:
+//		- admin
+//
+//	responses:
+//		'200':
+//			description: The domain allow that was just deleted.
+//			schema:
+//				"$ref": "#/definitions/domainPermission"
+//		'400':
+//			description: bad request
+//		'401':
+//			description: unauthorized
+//		'403':
+//			description: forbidden
+//		'404':
+//			description: not found
+//		'406':
+//			description: not acceptable
+//		'409':
+//			description: >-
+//				Conflict: There is already an admin action running that conflicts with this action.
+//				Check the error message in the response body for more information. This is a temporary
+//				error; it should be possible to process this action if you try again in a bit.
+//		'500':
+//			description: internal server error
+func (m *Module) DomainAllowDELETEHandler(c *gin.Context) {
+	m.deleteDomainPermission(c, gtsmodel.DomainPermissionAllow)
+}
diff --git a/internal/api/client/admin/domainallowget.go b/internal/api/client/admin/domainallowget.go
new file mode 100644
index 000000000..aa21743fa
--- /dev/null
+++ b/internal/api/client/admin/domainallowget.go
@@ -0,0 +1,67 @@
+// GoToSocial
+// Copyright (C) GoToSocial Authors admin@gotosocial.org
+// SPDX-License-Identifier: AGPL-3.0-or-later
+//
+// This program is free software: you can redistribute it and/or modify
+// it under the terms of the GNU Affero General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+// GNU Affero General Public License for more details.
+//
+// You should have received a copy of the GNU Affero General Public License
+// along with this program.  If not, see .
+
+package admin
+
+import (
+	"github.com/gin-gonic/gin"
+	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
+)
+
+// DomainAllowGETHandler swagger:operation GET /api/v1/admin/domain_allows/{id} domainAllowGet
+//
+// View domain allow with the given ID.
+//
+//	---
+//	tags:
+//	- admin
+//
+//	produces:
+//	- application/json
+//
+//	parameters:
+//	-
+//		name: id
+//		type: string
+//		description: The id of the domain allow.
+//		in: path
+//		required: true
+//
+//	security:
+//	- OAuth2 Bearer:
+//		- admin
+//
+//	responses:
+//		'200':
+//			description: The requested domain allow.
+//			schema:
+//				"$ref": "#/definitions/domainPermission"
+//		'400':
+//			description: bad request
+//		'401':
+//			description: unauthorized
+//		'403':
+//			description: forbidden
+//		'404':
+//			description: not found
+//		'406':
+//			description: not acceptable
+//		'500':
+//			description: internal server error
+func (m *Module) DomainAllowGETHandler(c *gin.Context) {
+	m.getDomainPermission(c, gtsmodel.DomainPermissionAllow)
+}
diff --git a/internal/api/client/admin/domainallowsget.go b/internal/api/client/admin/domainallowsget.go
new file mode 100644
index 000000000..6391c7138
--- /dev/null
+++ b/internal/api/client/admin/domainallowsget.go
@@ -0,0 +1,73 @@
+// GoToSocial
+// Copyright (C) GoToSocial Authors admin@gotosocial.org
+// SPDX-License-Identifier: AGPL-3.0-or-later
+//
+// This program is free software: you can redistribute it and/or modify
+// it under the terms of the GNU Affero General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+// GNU Affero General Public License for more details.
+//
+// You should have received a copy of the GNU Affero General Public License
+// along with this program.  If not, see .
+
+package admin
+
+import (
+	"github.com/gin-gonic/gin"
+	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
+)
+
+// DomainAllowsGETHandler swagger:operation GET /api/v1/admin/domain_allows domainAllowsGet
+//
+// View all domain allows currently in place.
+//
+//	---
+//	tags:
+//	- admin
+//
+//	produces:
+//	- application/json
+//
+//	parameters:
+//	-
+//		name: export
+//		type: boolean
+//		description: >-
+//			If set to `true`, then each entry in the returned list of domain allows will only consist of
+//			the fields `domain` and `public_comment`. This is perfect for when you want to save and share
+//			a list of all the domains you have allowed on your instance, so that someone else can easily import them,
+//			but you don't want them to see the database IDs of your allows, or private comments etc.
+//		in: query
+//		required: false
+//
+//	security:
+//	- OAuth2 Bearer:
+//		- admin
+//
+//	responses:
+//		'200':
+//			description: All domain allows currently in place.
+//			schema:
+//				type: array
+//				items:
+//					"$ref": "#/definitions/domainPermission"
+//		'400':
+//			description: bad request
+//		'401':
+//			description: unauthorized
+//		'403':
+//			description: forbidden
+//		'404':
+//			description: not found
+//		'406':
+//			description: not acceptable
+//		'500':
+//			description: internal server error
+func (m *Module) DomainAllowsGETHandler(c *gin.Context) {
+	m.getDomainPermissions(c, gtsmodel.DomainPermissionAllow)
+}
diff --git a/internal/api/client/admin/domainblockcreate.go b/internal/api/client/admin/domainblockcreate.go
index 5cf9ea279..5234561cf 100644
--- a/internal/api/client/admin/domainblockcreate.go
+++ b/internal/api/client/admin/domainblockcreate.go
@@ -18,15 +18,8 @@
 package admin
 
 import (
-	"errors"
-	"fmt"
-	"net/http"
-
 	"github.com/gin-gonic/gin"
-	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
-	apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util"
-	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
-	"github.com/superseriousbusiness/gotosocial/internal/oauth"
+	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 )
 
 // DomainBlocksPOSTHandler swagger:operation POST /api/v1/admin/domain_blocks domainBlockCreate
@@ -108,7 +101,7 @@ import (
 //				The newly created domain block, if `import` != `true`.
 //				If a list has been imported, then an `array` of newly created domain blocks will be returned instead.
 //			schema:
-//				"$ref": "#/definitions/domainBlock"
+//				"$ref": "#/definitions/domainPermission"
 //		'400':
 //			description: bad request
 //		'401':
@@ -127,108 +120,9 @@ import (
 //		'500':
 //			description: internal server error
 func (m *Module) DomainBlocksPOSTHandler(c *gin.Context) {
-	authed, err := oauth.Authed(c, true, true, true, true)
-	if err != nil {
-		apiutil.ErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	if !*authed.User.Admin {
-		err := fmt.Errorf("user %s not an admin", authed.User.ID)
-		apiutil.ErrorHandler(c, gtserror.NewErrorForbidden(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	if _, err := apiutil.NegotiateAccept(c, apiutil.JSONAcceptHeaders...); err != nil {
-		apiutil.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	importing, errWithCode := apiutil.ParseDomainBlockImport(c.Query(apiutil.DomainBlockImportKey), false)
-	if errWithCode != nil {
-		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
-		return
-	}
-
-	form := new(apimodel.DomainBlockCreateRequest)
-	if err := c.ShouldBind(form); err != nil {
-		apiutil.ErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	if err := validateCreateDomainBlock(form, importing); err != nil {
-		err := fmt.Errorf("error validating form: %w", err)
-		apiutil.ErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	if !importing {
-		// Single domain block creation.
-		domainBlock, _, errWithCode := m.processor.Admin().DomainBlockCreate(
-			c.Request.Context(),
-			authed.Account,
-			form.Domain,
-			form.Obfuscate,
-			form.PublicComment,
-			form.PrivateComment,
-			"", // No sub ID for single block creation.
-		)
-		if errWithCode != nil {
-			apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
-			return
-		}
-
-		c.JSON(http.StatusOK, domainBlock)
-		return
-	}
-
-	// We're importing multiple domain blocks,
-	// so we're looking at a multi-status response.
-	multiStatus, errWithCode := m.processor.Admin().DomainBlocksImport(
-		c.Request.Context(),
-		authed.Account,
-		form.Domains, // Pass the file through.
+	m.createDomainPermissions(c,
+		gtsmodel.DomainPermissionBlock,
+		m.processor.Admin().DomainPermissionCreate,
+		m.processor.Admin().DomainPermissionsImport,
 	)
-	if errWithCode != nil {
-		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
-		return
-	}
-
-	// TODO: Return 207 and multiStatus data nicely
-	//       when supported by the admin panel.
-
-	if multiStatus.Metadata.Failure != 0 {
-		failures := make(map[string]any, multiStatus.Metadata.Failure)
-		for _, entry := range multiStatus.Data {
-			// nolint:forcetypeassert
-			failures[entry.Resource.(string)] = entry.Message
-		}
-
-		err := fmt.Errorf("one or more errors importing domain blocks: %+v", failures)
-		apiutil.ErrorHandler(c, gtserror.NewErrorUnprocessableEntity(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	// Success, return slice of domain blocks.
-	domainBlocks := make([]any, 0, multiStatus.Metadata.Success)
-	for _, entry := range multiStatus.Data {
-		domainBlocks = append(domainBlocks, entry.Resource)
-	}
-
-	c.JSON(http.StatusOK, domainBlocks)
-}
-
-func validateCreateDomainBlock(form *apimodel.DomainBlockCreateRequest, imp bool) error {
-	if imp {
-		if form.Domains.Size == 0 {
-			return errors.New("import was specified but list of domains is empty")
-		}
-	} else {
-		// add some more validation here later if necessary
-		if form.Domain == "" {
-			return errors.New("empty domain provided")
-		}
-	}
-
-	return nil
 }
diff --git a/internal/api/client/admin/domainblockdelete.go b/internal/api/client/admin/domainblockdelete.go
index 9318bad87..a6f6619cd 100644
--- a/internal/api/client/admin/domainblockdelete.go
+++ b/internal/api/client/admin/domainblockdelete.go
@@ -18,14 +18,8 @@
 package admin
 
 import (
-	"errors"
-	"fmt"
-	"net/http"
-
 	"github.com/gin-gonic/gin"
-	apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util"
-	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
-	"github.com/superseriousbusiness/gotosocial/internal/oauth"
+	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 )
 
 // DomainBlockDELETEHandler swagger:operation DELETE /api/v1/admin/domain_blocks/{id} domainBlockDelete
@@ -55,7 +49,7 @@ import (
 //		'200':
 //			description: The domain block that was just deleted.
 //			schema:
-//				"$ref": "#/definitions/domainBlock"
+//				"$ref": "#/definitions/domainPermission"
 //		'400':
 //			description: bad request
 //		'401':
@@ -74,35 +68,5 @@ import (
 //		'500':
 //			description: internal server error
 func (m *Module) DomainBlockDELETEHandler(c *gin.Context) {
-	authed, err := oauth.Authed(c, true, true, true, true)
-	if err != nil {
-		apiutil.ErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	if !*authed.User.Admin {
-		err := fmt.Errorf("user %s not an admin", authed.User.ID)
-		apiutil.ErrorHandler(c, gtserror.NewErrorForbidden(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	if _, err := apiutil.NegotiateAccept(c, apiutil.JSONAcceptHeaders...); err != nil {
-		apiutil.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	domainBlockID := c.Param(IDKey)
-	if domainBlockID == "" {
-		err := errors.New("no domain block id specified")
-		apiutil.ErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	domainBlock, _, errWithCode := m.processor.Admin().DomainBlockDelete(c.Request.Context(), authed.Account, domainBlockID)
-	if errWithCode != nil {
-		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
-		return
-	}
-
-	c.JSON(http.StatusOK, domainBlock)
+	m.deleteDomainPermission(c, gtsmodel.DomainPermissionBlock)
 }
diff --git a/internal/api/client/admin/domainblockget.go b/internal/api/client/admin/domainblockget.go
index 87bb75a27..9e8d29905 100644
--- a/internal/api/client/admin/domainblockget.go
+++ b/internal/api/client/admin/domainblockget.go
@@ -18,13 +18,8 @@
 package admin
 
 import (
-	"fmt"
-	"net/http"
-
 	"github.com/gin-gonic/gin"
-	apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util"
-	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
-	"github.com/superseriousbusiness/gotosocial/internal/oauth"
+	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 )
 
 // DomainBlockGETHandler swagger:operation GET /api/v1/admin/domain_blocks/{id} domainBlockGet
@@ -54,7 +49,7 @@ import (
 //		'200':
 //			description: The requested domain block.
 //			schema:
-//				"$ref": "#/definitions/domainBlock"
+//				"$ref": "#/definitions/domainPermission"
 //		'400':
 //			description: bad request
 //		'401':
@@ -68,40 +63,5 @@ import (
 //		'500':
 //			description: internal server error
 func (m *Module) DomainBlockGETHandler(c *gin.Context) {
-	authed, err := oauth.Authed(c, true, true, true, true)
-	if err != nil {
-		apiutil.ErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	if !*authed.User.Admin {
-		err := fmt.Errorf("user %s not an admin", authed.User.ID)
-		apiutil.ErrorHandler(c, gtserror.NewErrorForbidden(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	if _, err := apiutil.NegotiateAccept(c, apiutil.JSONAcceptHeaders...); err != nil {
-		apiutil.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	domainBlockID, errWithCode := apiutil.ParseID(c.Param(apiutil.IDKey))
-	if errWithCode != nil {
-		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
-		return
-	}
-
-	export, errWithCode := apiutil.ParseDomainBlockExport(c.Query(apiutil.DomainBlockExportKey), false)
-	if errWithCode != nil {
-		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
-		return
-	}
-
-	domainBlock, errWithCode := m.processor.Admin().DomainBlockGet(c.Request.Context(), domainBlockID, export)
-	if errWithCode != nil {
-		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
-		return
-	}
-
-	c.JSON(http.StatusOK, domainBlock)
+	m.getDomainPermission(c, gtsmodel.DomainPermissionBlock)
 }
diff --git a/internal/api/client/admin/domainblocksget.go b/internal/api/client/admin/domainblocksget.go
index 68947f471..bdcc03469 100644
--- a/internal/api/client/admin/domainblocksget.go
+++ b/internal/api/client/admin/domainblocksget.go
@@ -18,13 +18,8 @@
 package admin
 
 import (
-	"fmt"
-	"net/http"
-
 	"github.com/gin-gonic/gin"
-	apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util"
-	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
-	"github.com/superseriousbusiness/gotosocial/internal/oauth"
+	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 )
 
 // DomainBlocksGETHandler swagger:operation GET /api/v1/admin/domain_blocks domainBlocksGet
@@ -60,7 +55,7 @@ import (
 //			schema:
 //				type: array
 //				items:
-//					"$ref": "#/definitions/domainBlock"
+//					"$ref": "#/definitions/domainPermission"
 //		'400':
 //			description: bad request
 //		'401':
@@ -74,34 +69,5 @@ import (
 //		'500':
 //			description: internal server error
 func (m *Module) DomainBlocksGETHandler(c *gin.Context) {
-	authed, err := oauth.Authed(c, true, true, true, true)
-	if err != nil {
-		apiutil.ErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	if !*authed.User.Admin {
-		err := fmt.Errorf("user %s not an admin", authed.User.ID)
-		apiutil.ErrorHandler(c, gtserror.NewErrorForbidden(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	if _, err := apiutil.NegotiateAccept(c, apiutil.JSONAcceptHeaders...); err != nil {
-		apiutil.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGetV1)
-		return
-	}
-
-	export, errWithCode := apiutil.ParseDomainBlockExport(c.Query(apiutil.DomainBlockExportKey), false)
-	if errWithCode != nil {
-		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
-		return
-	}
-
-	domainBlocks, errWithCode := m.processor.Admin().DomainBlocksGet(c.Request.Context(), authed.Account, export)
-	if errWithCode != nil {
-		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
-		return
-	}
-
-	c.JSON(http.StatusOK, domainBlocks)
+	m.getDomainPermissions(c, gtsmodel.DomainPermissionBlock)
 }
diff --git a/internal/api/client/admin/domainpermission.go b/internal/api/client/admin/domainpermission.go
new file mode 100644
index 000000000..80aa05041
--- /dev/null
+++ b/internal/api/client/admin/domainpermission.go
@@ -0,0 +1,295 @@
+// GoToSocial
+// Copyright (C) GoToSocial Authors admin@gotosocial.org
+// SPDX-License-Identifier: AGPL-3.0-or-later
+//
+// This program is free software: you can redistribute it and/or modify
+// it under the terms of the GNU Affero General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+// GNU Affero General Public License for more details.
+//
+// You should have received a copy of the GNU Affero General Public License
+// along with this program.  If not, see .
+
+package admin
+
+import (
+	"context"
+	"errors"
+	"fmt"
+	"mime/multipart"
+	"net/http"
+
+	"github.com/gin-gonic/gin"
+	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
+	apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util"
+	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
+	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
+	"github.com/superseriousbusiness/gotosocial/internal/oauth"
+)
+
+type singleDomainPermCreate func(
+	context.Context,
+	gtsmodel.DomainPermissionType, // block/allow
+	*gtsmodel.Account, // admin account
+	string, // domain
+	bool, // obfuscate
+	string, // publicComment
+	string, // privateComment
+	string, // subscriptionID
+) (*apimodel.DomainPermission, string, gtserror.WithCode)
+
+type multiDomainPermCreate func(
+	context.Context,
+	gtsmodel.DomainPermissionType, // block/allow
+	*gtsmodel.Account, // admin account
+	*multipart.FileHeader, // domains
+) (*apimodel.MultiStatus, gtserror.WithCode)
+
+// createDomainPemissions either creates a single domain
+// permission entry (block/allow) or imports multiple domain
+// permission entries (multiple blocks, multiple allows)
+// using the given functions.
+//
+// Handling the creation of both types of permissions in
+// one function in this way reduces code duplication.
+func (m *Module) createDomainPermissions(
+	c *gin.Context,
+	permType gtsmodel.DomainPermissionType,
+	single singleDomainPermCreate,
+	multi multiDomainPermCreate,
+) {
+	authed, err := oauth.Authed(c, true, true, true, true)
+	if err != nil {
+		apiutil.ErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	if !*authed.User.Admin {
+		err := fmt.Errorf("user %s not an admin", authed.User.ID)
+		apiutil.ErrorHandler(c, gtserror.NewErrorForbidden(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	if _, err := apiutil.NegotiateAccept(c, apiutil.JSONAcceptHeaders...); err != nil {
+		apiutil.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	importing, errWithCode := apiutil.ParseDomainPermissionImport(c.Query(apiutil.DomainPermissionImportKey), false)
+	if errWithCode != nil {
+		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
+		return
+	}
+
+	// Parse + validate form.
+	form := new(apimodel.DomainPermissionRequest)
+	if err := c.ShouldBind(form); err != nil {
+		apiutil.ErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	if importing && form.Domains.Size == 0 {
+		err = errors.New("import was specified but list of domains is empty")
+	} else if form.Domain == "" {
+		err = errors.New("empty domain provided")
+	}
+
+	if err != nil {
+		apiutil.ErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	if !importing {
+		// Single domain permission creation.
+		domainBlock, _, errWithCode := single(
+			c.Request.Context(),
+			permType,
+			authed.Account,
+			form.Domain,
+			form.Obfuscate,
+			form.PublicComment,
+			form.PrivateComment,
+			"", // No sub ID for single perm creation.
+		)
+
+		if errWithCode != nil {
+			apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
+			return
+		}
+
+		c.JSON(http.StatusOK, domainBlock)
+		return
+	}
+
+	// We're importing multiple domain permissions,
+	// so we're looking at a multi-status response.
+	multiStatus, errWithCode := multi(
+		c.Request.Context(),
+		permType,
+		authed.Account,
+		form.Domains, // Pass the file through.
+	)
+	if errWithCode != nil {
+		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
+		return
+	}
+
+	// TODO: Return 207 and multiStatus data nicely
+	//       when supported by the admin panel.
+	if multiStatus.Metadata.Failure != 0 {
+		failures := make(map[string]any, multiStatus.Metadata.Failure)
+		for _, entry := range multiStatus.Data {
+			// nolint:forcetypeassert
+			failures[entry.Resource.(string)] = entry.Message
+		}
+
+		err := fmt.Errorf("one or more errors importing domain %ss: %+v", permType.String(), failures)
+		apiutil.ErrorHandler(c, gtserror.NewErrorUnprocessableEntity(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	// Success, return slice of newly-created domain perms.
+	domainPerms := make([]any, 0, multiStatus.Metadata.Success)
+	for _, entry := range multiStatus.Data {
+		domainPerms = append(domainPerms, entry.Resource)
+	}
+
+	c.JSON(http.StatusOK, domainPerms)
+}
+
+// deleteDomainPermission deletes a single domain permission (block or allow).
+func (m *Module) deleteDomainPermission(
+	c *gin.Context,
+	permType gtsmodel.DomainPermissionType, // block/allow
+) {
+	authed, err := oauth.Authed(c, true, true, true, true)
+	if err != nil {
+		apiutil.ErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	if !*authed.User.Admin {
+		err := fmt.Errorf("user %s not an admin", authed.User.ID)
+		apiutil.ErrorHandler(c, gtserror.NewErrorForbidden(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	if _, err := apiutil.NegotiateAccept(c, apiutil.JSONAcceptHeaders...); err != nil {
+		apiutil.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	domainPermID, errWithCode := apiutil.ParseID(c.Param(apiutil.IDKey))
+	if errWithCode != nil {
+		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
+		return
+	}
+
+	domainPerm, _, errWithCode := m.processor.Admin().DomainPermissionDelete(
+		c.Request.Context(),
+		permType,
+		authed.Account,
+		domainPermID,
+	)
+	if errWithCode != nil {
+		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
+		return
+	}
+
+	c.JSON(http.StatusOK, domainPerm)
+}
+
+// getDomainPermission gets a single domain permission (block or allow).
+func (m *Module) getDomainPermission(
+	c *gin.Context,
+	permType gtsmodel.DomainPermissionType,
+) {
+	authed, err := oauth.Authed(c, true, true, true, true)
+	if err != nil {
+		apiutil.ErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	if !*authed.User.Admin {
+		err := fmt.Errorf("user %s not an admin", authed.User.ID)
+		apiutil.ErrorHandler(c, gtserror.NewErrorForbidden(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	if _, err := apiutil.NegotiateAccept(c, apiutil.JSONAcceptHeaders...); err != nil {
+		apiutil.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	domainPermID, errWithCode := apiutil.ParseID(c.Param(apiutil.IDKey))
+	if errWithCode != nil {
+		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
+		return
+	}
+
+	export, errWithCode := apiutil.ParseDomainPermissionExport(c.Query(apiutil.DomainPermissionExportKey), false)
+	if errWithCode != nil {
+		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
+		return
+	}
+
+	domainPerm, errWithCode := m.processor.Admin().DomainPermissionGet(
+		c.Request.Context(),
+		permType,
+		domainPermID,
+		export,
+	)
+	if errWithCode != nil {
+		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
+		return
+	}
+
+	c.JSON(http.StatusOK, domainPerm)
+}
+
+// getDomainPermissions gets all domain permissions of the given type (block, allow).
+func (m *Module) getDomainPermissions(
+	c *gin.Context,
+	permType gtsmodel.DomainPermissionType,
+) {
+	authed, err := oauth.Authed(c, true, true, true, true)
+	if err != nil {
+		apiutil.ErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	if !*authed.User.Admin {
+		err := fmt.Errorf("user %s not an admin", authed.User.ID)
+		apiutil.ErrorHandler(c, gtserror.NewErrorForbidden(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	if _, err := apiutil.NegotiateAccept(c, apiutil.JSONAcceptHeaders...); err != nil {
+		apiutil.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGetV1)
+		return
+	}
+
+	export, errWithCode := apiutil.ParseDomainPermissionExport(c.Query(apiutil.DomainPermissionExportKey), false)
+	if errWithCode != nil {
+		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
+		return
+	}
+
+	domainPerm, errWithCode := m.processor.Admin().DomainPermissionsGet(
+		c.Request.Context(),
+		permType,
+		authed.Account,
+		export,
+	)
+	if errWithCode != nil {
+		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
+		return
+	}
+
+	c.JSON(http.StatusOK, domainPerm)
+}
diff --git a/internal/api/model/domain.go b/internal/api/model/domain.go
index c5f77c82f..a5e1ddf10 100644
--- a/internal/api/model/domain.go
+++ b/internal/api/model/domain.go
@@ -37,46 +37,53 @@ type Domain struct {
 	PublicComment string `form:"public_comment" json:"public_comment,omitempty"`
 }
 
-// DomainBlock represents a block on one domain
+// DomainPermission represents a permission applied to one domain (explicit block/allow).
 //
-// swagger:model domainBlock
-type DomainBlock struct {
+// swagger:model domainPermission
+type DomainPermission struct {
 	Domain
-	// The ID of the domain block.
+	// The ID of the domain permission entry.
 	// example: 01FBW21XJA09XYX51KV5JVBW0F
 	// readonly: true
 	ID string `json:"id,omitempty"`
-	// Obfuscate the domain name when serving this domain block publicly.
-	// A useful anti-harassment tool.
+	// Obfuscate the domain name when serving this domain permission entry publicly.
 	// example: false
 	Obfuscate bool `json:"obfuscate,omitempty"`
-	// Private comment for this block, visible to our instance admins only.
+	// Private comment for this permission entry, visible to this instance's admins only.
 	// example: they are poopoo
 	PrivateComment string `json:"private_comment,omitempty"`
-	// The ID of the subscription that created/caused this domain block.
+	// If applicable, the ID of the subscription that caused this domain permission entry to be created.
 	// example: 01FBW25TF5J67JW3HFHZCSD23K
 	SubscriptionID string `json:"subscription_id,omitempty"`
-	// ID of the account that created this domain block.
+	// ID of the account that created this domain permission entry.
 	// example: 01FBW2758ZB6PBR200YPDDJK4C
 	CreatedBy string `json:"created_by,omitempty"`
-	// Time at which this block was created (ISO 8601 Datetime).
+	// Time at which the permission entry was created (ISO 8601 Datetime).
 	// example: 2021-07-30T09:20:25+00:00
 	CreatedAt string `json:"created_at,omitempty"`
 }
 
-// DomainBlockCreateRequest is the form submitted as a POST to /api/v1/admin/domain_blocks to create a new block.
+// DomainPermissionRequest is the form submitted as a POST to create a new domain permission entry (allow/block).
 //
-// swagger:model domainBlockCreateRequest
-type DomainBlockCreateRequest struct {
-	// A list of domains to block. Only used if import=true is specified.
+// swagger:model domainPermissionCreateRequest
+type DomainPermissionRequest struct {
+	// A list of domains for which this permission request should apply.
+	// Only used if import=true is specified.
 	Domains *multipart.FileHeader `form:"domains" json:"domains" xml:"domains"`
-	// hostname/domain to block
+	// A single domain for which this permission request should apply.
+	// Only used if import=true is NOT specified or if import=false.
+	// example: example.org
 	Domain string `form:"domain" json:"domain" xml:"domain"`
-	// whether the domain should be obfuscated when being displayed publicly
+	// Obfuscate the domain name when displaying this permission entry publicly.
+	// Ie., instead of 'example.org' show something like 'e**mpl*.or*'.
+	// example: false
 	Obfuscate bool `form:"obfuscate" json:"obfuscate" xml:"obfuscate"`
-	// private comment for other admins on why the domain was blocked
+	// Private comment for other admins on why this permission entry was created.
+	// example: don't like 'em!!!!
 	PrivateComment string `form:"private_comment" json:"private_comment" xml:"private_comment"`
-	// public comment on the reason for the domain block
+	// Public comment on why this permission entry was created.
+	// Will be visible to requesters at /api/v1/instance/peers if this endpoint is exposed.
+	// example: foss dorks 😫
 	PublicComment string `form:"public_comment" json:"public_comment" xml:"public_comment"`
 }
 
diff --git a/internal/api/util/parsequery.go b/internal/api/util/parsequery.go
index a87c77aeb..6a9116dcf 100644
--- a/internal/api/util/parsequery.go
+++ b/internal/api/util/parsequery.go
@@ -60,10 +60,10 @@ const (
 	WebUsernameKey = "username"
 	WebStatusIDKey = "status"
 
-	/* Domain block keys */
+	/* Domain permission keys */
 
-	DomainBlockExportKey = "export"
-	DomainBlockImportKey = "import"
+	DomainPermissionExportKey = "export"
+	DomainPermissionImportKey = "import"
 )
 
 // parseError returns gtserror.WithCode set to 400 Bad Request, to indicate
@@ -121,12 +121,12 @@ func ParseSearchResolve(value string, defaultValue bool) (bool, gtserror.WithCod
 	return parseBool(value, defaultValue, SearchResolveKey)
 }
 
-func ParseDomainBlockExport(value string, defaultValue bool) (bool, gtserror.WithCode) {
-	return parseBool(value, defaultValue, DomainBlockExportKey)
+func ParseDomainPermissionExport(value string, defaultValue bool) (bool, gtserror.WithCode) {
+	return parseBool(value, defaultValue, DomainPermissionExportKey)
 }
 
-func ParseDomainBlockImport(value string, defaultValue bool) (bool, gtserror.WithCode) {
-	return parseBool(value, defaultValue, DomainBlockImportKey)
+func ParseDomainPermissionImport(value string, defaultValue bool) (bool, gtserror.WithCode) {
+	return parseBool(value, defaultValue, DomainPermissionImportKey)
 }
 
 /*
diff --git a/internal/cache/domain/domain.go b/internal/cache/domain/domain.go
index 37e97472a..051ec5c1b 100644
--- a/internal/cache/domain/domain.go
+++ b/internal/cache/domain/domain.go
@@ -26,23 +26,28 @@ import (
 	"golang.org/x/exp/slices"
 )
 
-// BlockCache provides a means of caching domain blocks in memory to reduce load
-// on an underlying storage mechanism, e.g. a database.
+// Cache provides a means of caching domains in memory to reduce
+// load on an underlying storage mechanism, e.g. a database.
 //
-// The in-memory block list is kept up-to-date by means of a passed loader function during every
-// call to .IsBlocked(). In the case of a nil internal block list, the loader function is called to
-// hydrate the cache with the latest list of domain blocks. The .Clear() function can be used to
-// invalidate the cache, e.g. when a domain block is added / deleted from the database.
-type BlockCache struct {
+// The in-memory domain list is kept up-to-date by means of a passed
+// loader function during every call to .Matches(). In the case of
+// a nil internal domain list, the loader function is called to hydrate
+// the cache with the latest list of domains.
+//
+// The .Clear() function can be used to invalidate the cache,
+// e.g. when an entry is added / deleted from the database.
+type Cache struct {
 	// atomically updated ptr value to the
-	// current domain block cache radix trie.
+	// current domain cache radix trie.
 	rootptr unsafe.Pointer
 }
 
-// IsBlocked checks whether domain is blocked. If the cache is not currently loaded, then the provided load function is used to hydrate it.
-func (b *BlockCache) IsBlocked(domain string, load func() ([]string, error)) (bool, error) {
+// Matches checks whether domain matches an entry in the cache.
+// If the cache is not currently loaded, then the provided load
+// function is used to hydrate it.
+func (c *Cache) Matches(domain string, load func() ([]string, error)) (bool, error) {
 	// Load the current root pointer value.
-	ptr := atomic.LoadPointer(&b.rootptr)
+	ptr := atomic.LoadPointer(&c.rootptr)
 
 	if ptr == nil {
 		// Cache is not hydrated.
@@ -67,7 +72,7 @@ func (b *BlockCache) IsBlocked(domain string, load func() ([]string, error)) (bo
 
 		// Store the new node ptr.
 		ptr = unsafe.Pointer(root)
-		atomic.StorePointer(&b.rootptr, ptr)
+		atomic.StorePointer(&c.rootptr, ptr)
 	}
 
 	// Look for a match in the trie node.
@@ -75,22 +80,20 @@ func (b *BlockCache) IsBlocked(domain string, load func() ([]string, error)) (bo
 }
 
 // Clear will drop the currently loaded domain list,
-// triggering a reload on next call to .IsBlocked().
-func (b *BlockCache) Clear() {
-	atomic.StorePointer(&b.rootptr, nil)
+// triggering a reload on next call to .Matches().
+func (c *Cache) Clear() {
+	atomic.StorePointer(&c.rootptr, nil)
 }
 
-// String returns a string representation of stored domains in block cache.
-func (b *BlockCache) String() string {
-	if ptr := atomic.LoadPointer(&b.rootptr); ptr != nil {
+// String returns a string representation of stored domains in cache.
+func (c *Cache) String() string {
+	if ptr := atomic.LoadPointer(&c.rootptr); ptr != nil {
 		return (*root)(ptr).String()
 	}
 	return ""
 }
 
-// root is the root node in the domain
-// block cache radix trie. this is the
-// singular access point to the trie.
+// root is the root node in the domain cache radix trie. this is the singular access point to the trie.
 type root struct{ root node }
 
 // Add will add the given domain to the radix trie.
@@ -99,14 +102,14 @@ func (r *root) Add(domain string) {
 }
 
 // Match will return whether the given domain matches
-// an existing stored domain block in this radix trie.
+// an existing stored domain in this radix trie.
 func (r *root) Match(domain string) bool {
 	return r.root.match(strings.Split(domain, "."))
 }
 
 // Sort will sort the entire radix trie ensuring that
 // child nodes are stored in alphabetical order. This
-// MUST be done to finalize the block cache in order
+// MUST be done to finalize the domain cache in order
 // to speed up the binary search of node child parts.
 func (r *root) Sort() {
 	r.root.sort()
@@ -154,7 +157,7 @@ func (n *node) add(parts []string) {
 
 		if len(parts) == 0 {
 			// Drop all children here as
-			// this is a higher-level block
+			// this is a higher-level domain
 			// than that we previously had.
 			nn.child = nil
 			return
diff --git a/internal/cache/domain/domain_test.go b/internal/cache/domain/domain_test.go
index 8f975497b..9e091e1d0 100644
--- a/internal/cache/domain/domain_test.go
+++ b/internal/cache/domain/domain_test.go
@@ -24,21 +24,21 @@ import (
 	"github.com/superseriousbusiness/gotosocial/internal/cache/domain"
 )
 
-func TestBlockCache(t *testing.T) {
-	c := new(domain.BlockCache)
+func TestCache(t *testing.T) {
+	c := new(domain.Cache)
 
-	blocks := []string{
+	cachedDomains := []string{
 		"google.com",
 		"google.co.uk",
 		"pleroma.bad.host",
 	}
 
 	loader := func() ([]string, error) {
-		t.Log("load: returning blocked domains")
-		return blocks, nil
+		t.Log("load: returning cached domains")
+		return cachedDomains, nil
 	}
 
-	// Check a list of known blocked domains.
+	// Check a list of known cached domains.
 	for _, domain := range []string{
 		"google.com",
 		"mail.google.com",
@@ -47,13 +47,13 @@ func TestBlockCache(t *testing.T) {
 		"pleroma.bad.host",
 		"dev.pleroma.bad.host",
 	} {
-		t.Logf("checking domain is blocked: %s", domain)
-		if b, _ := c.IsBlocked(domain, loader); !b {
-			t.Errorf("domain should be blocked: %s", domain)
+		t.Logf("checking domain matches: %s", domain)
+		if b, _ := c.Matches(domain, loader); !b {
+			t.Errorf("domain should be matched: %s", domain)
 		}
 	}
 
-	// Check a list of known unblocked domains.
+	// Check a list of known uncached domains.
 	for _, domain := range []string{
 		"askjeeves.com",
 		"ask-kim.co.uk",
@@ -62,9 +62,9 @@ func TestBlockCache(t *testing.T) {
 		"gts.bad.host",
 		"mastodon.bad.host",
 	} {
-		t.Logf("checking domain isn't blocked: %s", domain)
-		if b, _ := c.IsBlocked(domain, loader); b {
-			t.Errorf("domain should not be blocked: %s", domain)
+		t.Logf("checking domain isn't matched: %s", domain)
+		if b, _ := c.Matches(domain, loader); b {
+			t.Errorf("domain should not be matched: %s", domain)
 		}
 	}
 
@@ -76,10 +76,10 @@ func TestBlockCache(t *testing.T) {
 	knownErr := errors.New("known error")
 
 	// Check that reload is actually performed and returns our error
-	if _, err := c.IsBlocked("", func() ([]string, error) {
+	if _, err := c.Matches("", func() ([]string, error) {
 		t.Log("load: returning known error")
 		return nil, knownErr
 	}); !errors.Is(err, knownErr) {
-		t.Errorf("is blocked did not return expected error: %v", err)
+		t.Errorf("matches did not return expected error: %v", err)
 	}
 }
diff --git a/internal/cache/gts.go b/internal/cache/gts.go
index 12e917919..16a1585f7 100644
--- a/internal/cache/gts.go
+++ b/internal/cache/gts.go
@@ -36,7 +36,8 @@ type GTSCaches struct {
 	block            *result.Cache[*gtsmodel.Block]
 	blockIDs         *SliceCache[string]
 	boostOfIDs       *SliceCache[string]
-	domainBlock      *domain.BlockCache
+	domainAllow      *domain.Cache
+	domainBlock      *domain.Cache
 	emoji            *result.Cache[*gtsmodel.Emoji]
 	emojiCategory    *result.Cache[*gtsmodel.EmojiCategory]
 	follow           *result.Cache[*gtsmodel.Follow]
@@ -72,6 +73,7 @@ func (c *GTSCaches) Init() {
 	c.initBlock()
 	c.initBlockIDs()
 	c.initBoostOfIDs()
+	c.initDomainAllow()
 	c.initDomainBlock()
 	c.initEmoji()
 	c.initEmojiCategory()
@@ -139,8 +141,13 @@ func (c *GTSCaches) BoostOfIDs() *SliceCache[string] {
 	return c.boostOfIDs
 }
 
+// DomainAllow provides access to the domain allow database cache.
+func (c *GTSCaches) DomainAllow() *domain.Cache {
+	return c.domainAllow
+}
+
 // DomainBlock provides access to the domain block database cache.
-func (c *GTSCaches) DomainBlock() *domain.BlockCache {
+func (c *GTSCaches) DomainBlock() *domain.Cache {
 	return c.domainBlock
 }
 
@@ -384,8 +391,12 @@ func (c *GTSCaches) initBoostOfIDs() {
 	)}
 }
 
+func (c *GTSCaches) initDomainAllow() {
+	c.domainAllow = new(domain.Cache)
+}
+
 func (c *GTSCaches) initDomainBlock() {
-	c.domainBlock = new(domain.BlockCache)
+	c.domainBlock = new(domain.Cache)
 }
 
 func (c *GTSCaches) initEmoji() {
diff --git a/internal/config/config.go b/internal/config/config.go
index 16ef32a8b..314257831 100644
--- a/internal/config/config.go
+++ b/internal/config/config.go
@@ -76,12 +76,13 @@ type Configuration struct {
 	WebTemplateBaseDir string `name:"web-template-base-dir" usage:"Basedir for html templating files for rendering pages and composing emails."`
 	WebAssetBaseDir    string `name:"web-asset-base-dir" usage:"Directory to serve static assets from, accessible at example.org/assets/"`
 
-	InstanceExposePeers            bool `name:"instance-expose-peers" usage:"Allow unauthenticated users to query /api/v1/instance/peers?filter=open"`
-	InstanceExposeSuspended        bool `name:"instance-expose-suspended" usage:"Expose suspended instances via web UI, and allow unauthenticated users to query /api/v1/instance/peers?filter=suspended"`
-	InstanceExposeSuspendedWeb     bool `name:"instance-expose-suspended-web" usage:"Expose list of suspended instances as webpage on /about/suspended"`
-	InstanceExposePublicTimeline   bool `name:"instance-expose-public-timeline" usage:"Allow unauthenticated users to query /api/v1/timelines/public"`
-	InstanceDeliverToSharedInboxes bool `name:"instance-deliver-to-shared-inboxes" usage:"Deliver federated messages to shared inboxes, if they're available."`
-	InstanceInjectMastodonVersion  bool `name:"instance-inject-mastodon-version" usage:"This injects a Mastodon compatible version in /api/v1/instance to help Mastodon clients that use that version for feature detection"`
+	InstanceFederationMode         string `name:"instance-federation-mode" usage:"Set instance federation mode."`
+	InstanceExposePeers            bool   `name:"instance-expose-peers" usage:"Allow unauthenticated users to query /api/v1/instance/peers?filter=open"`
+	InstanceExposeSuspended        bool   `name:"instance-expose-suspended" usage:"Expose suspended instances via web UI, and allow unauthenticated users to query /api/v1/instance/peers?filter=suspended"`
+	InstanceExposeSuspendedWeb     bool   `name:"instance-expose-suspended-web" usage:"Expose list of suspended instances as webpage on /about/suspended"`
+	InstanceExposePublicTimeline   bool   `name:"instance-expose-public-timeline" usage:"Allow unauthenticated users to query /api/v1/timelines/public"`
+	InstanceDeliverToSharedInboxes bool   `name:"instance-deliver-to-shared-inboxes" usage:"Deliver federated messages to shared inboxes, if they're available."`
+	InstanceInjectMastodonVersion  bool   `name:"instance-inject-mastodon-version" usage:"This injects a Mastodon compatible version in /api/v1/instance to help Mastodon clients that use that version for feature detection"`
 
 	AccountsRegistrationOpen bool `name:"accounts-registration-open" usage:"Allow anyone to submit an account signup request. If false, server will be invite-only."`
 	AccountsApprovalRequired bool `name:"accounts-approval-required" usage:"Do account signups require approval by an admin or moderator before user can log in? If false, new registrations will be automatically approved."`
diff --git a/internal/config/const.go b/internal/config/const.go
new file mode 100644
index 000000000..29e4b14e8
--- /dev/null
+++ b/internal/config/const.go
@@ -0,0 +1,26 @@
+// GoToSocial
+// Copyright (C) GoToSocial Authors admin@gotosocial.org
+// SPDX-License-Identifier: AGPL-3.0-or-later
+//
+// This program is free software: you can redistribute it and/or modify
+// it under the terms of the GNU Affero General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+// GNU Affero General Public License for more details.
+//
+// You should have received a copy of the GNU Affero General Public License
+// along with this program.  If not, see .
+
+package config
+
+// Instance federation mode determines how this
+// instance federates with others (if at all).
+const (
+	InstanceFederationModeBlocklist = "blocklist"
+	InstanceFederationModeAllowlist = "allowlist"
+	InstanceFederationModeDefault   = InstanceFederationModeBlocklist
+)
diff --git a/internal/config/defaults.go b/internal/config/defaults.go
index 9ad9c125c..fe2aa3acc 100644
--- a/internal/config/defaults.go
+++ b/internal/config/defaults.go
@@ -57,6 +57,7 @@ var Defaults = Configuration{
 	WebTemplateBaseDir: "./web/template/",
 	WebAssetBaseDir:    "./web/assets/",
 
+	InstanceFederationMode:         InstanceFederationModeDefault,
 	InstanceExposePeers:            false,
 	InstanceExposeSuspended:        false,
 	InstanceExposeSuspendedWeb:     false,
diff --git a/internal/config/flags.go b/internal/config/flags.go
index 74ceedc00..29e0726a6 100644
--- a/internal/config/flags.go
+++ b/internal/config/flags.go
@@ -83,6 +83,7 @@ func (s *ConfigState) AddServerFlags(cmd *cobra.Command) {
 		cmd.Flags().String(WebAssetBaseDirFlag(), cfg.WebAssetBaseDir, fieldtag("WebAssetBaseDir", "usage"))
 
 		// Instance
+		cmd.Flags().String(InstanceFederationModeFlag(), cfg.InstanceFederationMode, fieldtag("InstanceFederationMode", "usage"))
 		cmd.Flags().Bool(InstanceExposePeersFlag(), cfg.InstanceExposePeers, fieldtag("InstanceExposePeers", "usage"))
 		cmd.Flags().Bool(InstanceExposeSuspendedFlag(), cfg.InstanceExposeSuspended, fieldtag("InstanceExposeSuspended", "usage"))
 		cmd.Flags().Bool(InstanceExposeSuspendedWebFlag(), cfg.InstanceExposeSuspendedWeb, fieldtag("InstanceExposeSuspendedWeb", "usage"))
diff --git a/internal/config/helpers.gen.go b/internal/config/helpers.gen.go
index f232d37a3..46a239596 100644
--- a/internal/config/helpers.gen.go
+++ b/internal/config/helpers.gen.go
@@ -749,6 +749,31 @@ func GetWebAssetBaseDir() string { return global.GetWebAssetBaseDir() }
 // SetWebAssetBaseDir safely sets the value for global configuration 'WebAssetBaseDir' field
 func SetWebAssetBaseDir(v string) { global.SetWebAssetBaseDir(v) }
 
+// GetInstanceFederationMode safely fetches the Configuration value for state's 'InstanceFederationMode' field
+func (st *ConfigState) GetInstanceFederationMode() (v string) {
+	st.mutex.RLock()
+	v = st.config.InstanceFederationMode
+	st.mutex.RUnlock()
+	return
+}
+
+// SetInstanceFederationMode safely sets the Configuration value for state's 'InstanceFederationMode' field
+func (st *ConfigState) SetInstanceFederationMode(v string) {
+	st.mutex.Lock()
+	defer st.mutex.Unlock()
+	st.config.InstanceFederationMode = v
+	st.reloadToViper()
+}
+
+// InstanceFederationModeFlag returns the flag name for the 'InstanceFederationMode' field
+func InstanceFederationModeFlag() string { return "instance-federation-mode" }
+
+// GetInstanceFederationMode safely fetches the value for global configuration 'InstanceFederationMode' field
+func GetInstanceFederationMode() string { return global.GetInstanceFederationMode() }
+
+// SetInstanceFederationMode safely sets the value for global configuration 'InstanceFederationMode' field
+func SetInstanceFederationMode(v string) { global.SetInstanceFederationMode(v) }
+
 // GetInstanceExposePeers safely fetches the Configuration value for state's 'InstanceExposePeers' field
 func (st *ConfigState) GetInstanceExposePeers() (v bool) {
 	st.mutex.RLock()
diff --git a/internal/config/validate.go b/internal/config/validate.go
index bc8edc816..45cdc4eee 100644
--- a/internal/config/validate.go
+++ b/internal/config/validate.go
@@ -61,6 +61,17 @@ func Validate() error {
 		errs = append(errs, fmt.Errorf("%s must be set to either http or https, provided value was %s", ProtocolFlag(), proto))
 	}
 
+	// federation mode
+	switch federationMode := GetInstanceFederationMode(); federationMode {
+	case InstanceFederationModeBlocklist, InstanceFederationModeAllowlist:
+		// no problem
+		break
+	case "":
+		errs = append(errs, fmt.Errorf("%s must be set", InstanceFederationModeFlag()))
+	default:
+		errs = append(errs, fmt.Errorf("%s must be set to either blocklist or allowlist, provided value was %s", InstanceFederationModeFlag(), federationMode))
+	}
+
 	webAssetsBaseDir := GetWebAssetBaseDir()
 	if webAssetsBaseDir == "" {
 		errs = append(errs, fmt.Errorf("%s must be set", WebAssetBaseDirFlag()))
diff --git a/internal/db/bundb/domain.go b/internal/db/bundb/domain.go
index c989d4fe4..dd626bc0a 100644
--- a/internal/db/bundb/domain.go
+++ b/internal/db/bundb/domain.go
@@ -23,6 +23,7 @@ import (
 
 	"github.com/superseriousbusiness/gotosocial/internal/config"
 	"github.com/superseriousbusiness/gotosocial/internal/db"
+	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 	"github.com/superseriousbusiness/gotosocial/internal/state"
 	"github.com/superseriousbusiness/gotosocial/internal/util"
@@ -34,6 +35,102 @@ type domainDB struct {
 	state *state.State
 }
 
+func (d *domainDB) CreateDomainAllow(ctx context.Context, allow *gtsmodel.DomainAllow) error {
+	// Normalize the domain as punycode
+	var err error
+	allow.Domain, err = util.Punify(allow.Domain)
+	if err != nil {
+		return err
+	}
+
+	// Attempt to store domain allow in DB
+	if _, err := d.db.NewInsert().
+		Model(allow).
+		Exec(ctx); err != nil {
+		return err
+	}
+
+	// Clear the domain allow cache (for later reload)
+	d.state.Caches.GTS.DomainAllow().Clear()
+
+	return nil
+}
+
+func (d *domainDB) GetDomainAllow(ctx context.Context, domain string) (*gtsmodel.DomainAllow, error) {
+	// Normalize the domain as punycode
+	domain, err := util.Punify(domain)
+	if err != nil {
+		return nil, err
+	}
+
+	// Check for easy case, domain referencing *us*
+	if domain == "" || domain == config.GetAccountDomain() ||
+		domain == config.GetHost() {
+		return nil, db.ErrNoEntries
+	}
+
+	var allow gtsmodel.DomainAllow
+
+	// Look for allow matching domain in DB
+	q := d.db.
+		NewSelect().
+		Model(&allow).
+		Where("? = ?", bun.Ident("domain_allow.domain"), domain)
+	if err := q.Scan(ctx); err != nil {
+		return nil, err
+	}
+
+	return &allow, nil
+}
+
+func (d *domainDB) GetDomainAllows(ctx context.Context) ([]*gtsmodel.DomainAllow, error) {
+	allows := []*gtsmodel.DomainAllow{}
+
+	if err := d.db.
+		NewSelect().
+		Model(&allows).
+		Scan(ctx); err != nil {
+		return nil, err
+	}
+
+	return allows, nil
+}
+
+func (d *domainDB) GetDomainAllowByID(ctx context.Context, id string) (*gtsmodel.DomainAllow, error) {
+	var allow gtsmodel.DomainAllow
+
+	q := d.db.
+		NewSelect().
+		Model(&allow).
+		Where("? = ?", bun.Ident("domain_allow.id"), id)
+	if err := q.Scan(ctx); err != nil {
+		return nil, err
+	}
+
+	return &allow, nil
+}
+
+func (d *domainDB) DeleteDomainAllow(ctx context.Context, domain string) error {
+	// Normalize the domain as punycode
+	domain, err := util.Punify(domain)
+	if err != nil {
+		return err
+	}
+
+	// Attempt to delete domain allow
+	if _, err := d.db.NewDelete().
+		Model((*gtsmodel.DomainAllow)(nil)).
+		Where("? = ?", bun.Ident("domain_allow.domain"), domain).
+		Exec(ctx); err != nil {
+		return err
+	}
+
+	// Clear the domain allow cache (for later reload)
+	d.state.Caches.GTS.DomainAllow().Clear()
+
+	return nil
+}
+
 func (d *domainDB) CreateDomainBlock(ctx context.Context, block *gtsmodel.DomainBlock) error {
 	// Normalize the domain as punycode
 	var err error
@@ -137,14 +234,32 @@ func (d *domainDB) IsDomainBlocked(ctx context.Context, domain string) (bool, er
 		return false, err
 	}
 
-	// Check for easy case, domain referencing *us*
+	// Domain referencing *us* cannot be blocked.
 	if domain == "" || domain == config.GetAccountDomain() ||
 		domain == config.GetHost() {
 		return false, nil
 	}
 
+	// Check the cache for an explicit domain allow (hydrating the cache with callback if necessary).
+	explicitAllow, err := d.state.Caches.GTS.DomainAllow().Matches(domain, func() ([]string, error) {
+		var domains []string
+
+		// Scan list of all explicitly allowed domains from DB
+		q := d.db.NewSelect().
+			Table("domain_allows").
+			Column("domain")
+		if err := q.Scan(ctx, &domains); err != nil {
+			return nil, err
+		}
+
+		return domains, nil
+	})
+	if err != nil {
+		return false, err
+	}
+
 	// Check the cache for a domain block (hydrating the cache with callback if necessary)
-	return d.state.Caches.GTS.DomainBlock().IsBlocked(domain, func() ([]string, error) {
+	explicitBlock, err := d.state.Caches.GTS.DomainBlock().Matches(domain, func() ([]string, error) {
 		var domains []string
 
 		// Scan list of all blocked domains from DB
@@ -157,6 +272,35 @@ func (d *domainDB) IsDomainBlocked(ctx context.Context, domain string) (bool, er
 
 		return domains, nil
 	})
+	if err != nil {
+		return false, err
+	}
+
+	// Calculate if blocked
+	// based on federation mode.
+	switch mode := config.GetInstanceFederationMode(); mode {
+
+	case config.InstanceFederationModeBlocklist:
+		// Blocklist/default mode: explicit allow
+		// takes precedence over explicit block.
+		//
+		// Domains that have neither block
+		// or allow entries are allowed.
+		return !(explicitAllow || !explicitBlock), nil
+
+	case config.InstanceFederationModeAllowlist:
+		// Allowlist mode: explicit block takes
+		// precedence over explicit allow.
+		//
+		// Domains that have neither block
+		// or allow entries are blocked.
+		return (explicitBlock || !explicitAllow), nil
+
+	default:
+		// This should never happen but account
+		// for it anyway to make the code tidier.
+		return false, gtserror.Newf("unrecognized federation mode: %s", mode)
+	}
 }
 
 func (d *domainDB) AreDomainsBlocked(ctx context.Context, domains []string) (bool, error) {
diff --git a/internal/db/bundb/domain_test.go b/internal/db/bundb/domain_test.go
index e4e199fa1..ff687cf59 100644
--- a/internal/db/bundb/domain_test.go
+++ b/internal/db/bundb/domain_test.go
@@ -55,6 +55,59 @@ func (suite *DomainTestSuite) TestIsDomainBlocked() {
 	suite.WithinDuration(time.Now(), domainBlock.CreatedAt, 10*time.Second)
 }
 
+func (suite *DomainTestSuite) TestIsDomainBlockedWithAllow() {
+	ctx := context.Background()
+
+	domainBlock := >smodel.DomainBlock{
+		ID:                 "01G204214Y9TNJEBX39C7G88SW",
+		Domain:             "some.bad.apples",
+		CreatedByAccountID: suite.testAccounts["admin_account"].ID,
+		CreatedByAccount:   suite.testAccounts["admin_account"],
+	}
+
+	// no domain block exists for the given domain yet
+	blocked, err := suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
+	if err != nil {
+		suite.FailNow(err.Error())
+	}
+
+	suite.False(blocked)
+
+	// Block this domain.
+	if err := suite.db.CreateDomainBlock(ctx, domainBlock); err != nil {
+		suite.FailNow(err.Error())
+	}
+
+	// domain block now exists
+	blocked, err = suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
+	if err != nil {
+		suite.FailNow(err.Error())
+	}
+
+	suite.True(blocked)
+	suite.WithinDuration(time.Now(), domainBlock.CreatedAt, 10*time.Second)
+
+	// Explicitly allow this domain.
+	domainAllow := >smodel.DomainAllow{
+		ID:                 "01H8KY9MJQFWE712EG3VN02Y3J",
+		Domain:             "some.bad.apples",
+		CreatedByAccountID: suite.testAccounts["admin_account"].ID,
+		CreatedByAccount:   suite.testAccounts["admin_account"],
+	}
+
+	if err := suite.db.CreateDomainAllow(ctx, domainAllow); err != nil {
+		suite.FailNow(err.Error())
+	}
+
+	// Domain allow now exists
+	blocked, err = suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
+	if err != nil {
+		suite.FailNow(err.Error())
+	}
+
+	suite.False(blocked)
+}
+
 func (suite *DomainTestSuite) TestIsDomainBlockedWildcard() {
 	ctx := context.Background()
 
diff --git a/internal/db/bundb/migrations/20230908083121_allowlist.go.go b/internal/db/bundb/migrations/20230908083121_allowlist.go.go
new file mode 100644
index 000000000..2d86f8c03
--- /dev/null
+++ b/internal/db/bundb/migrations/20230908083121_allowlist.go.go
@@ -0,0 +1,62 @@
+// GoToSocial
+// Copyright (C) GoToSocial Authors admin@gotosocial.org
+// SPDX-License-Identifier: AGPL-3.0-or-later
+//
+// This program is free software: you can redistribute it and/or modify
+// it under the terms of the GNU Affero General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+// GNU Affero General Public License for more details.
+//
+// You should have received a copy of the GNU Affero General Public License
+// along with this program.  If not, see .
+
+package migrations
+
+import (
+	"context"
+
+	gtsmodel "github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
+	"github.com/uptrace/bun"
+)
+
+func init() {
+	up := func(ctx context.Context, db *bun.DB) error {
+		return db.RunInTx(ctx, nil, func(ctx context.Context, tx bun.Tx) error {
+			// Create domain allow.
+			if _, err := tx.
+				NewCreateTable().
+				Model(>smodel.DomainAllow{}).
+				IfNotExists().
+				Exec(ctx); err != nil {
+				return err
+			}
+
+			// Index domain allow.
+			if _, err := tx.
+				NewCreateIndex().
+				Table("domain_allows").
+				Index("domain_allows_domain_idx").
+				Column("domain").
+				Exec(ctx); err != nil {
+				return err
+			}
+
+			return nil
+		})
+	}
+
+	down := func(ctx context.Context, db *bun.DB) error {
+		return db.RunInTx(ctx, nil, func(ctx context.Context, tx bun.Tx) error {
+			return nil
+		})
+	}
+
+	if err := Migrations.Register(up, down); err != nil {
+		panic(err)
+	}
+}
diff --git a/internal/db/domain.go b/internal/db/domain.go
index 740ccefe6..3f7803d62 100644
--- a/internal/db/domain.go
+++ b/internal/db/domain.go
@@ -26,6 +26,25 @@ import (
 
 // Domain contains DB functions related to domains and domain blocks.
 type Domain interface {
+	/*
+		Block/allow storage + retrieval functions.
+	*/
+
+	// CreateDomainAllow puts the given instance-level domain allow into the database.
+	CreateDomainAllow(ctx context.Context, allow *gtsmodel.DomainAllow) error
+
+	// GetDomainAllow returns one instance-level domain allow with the given domain, if it exists.
+	GetDomainAllow(ctx context.Context, domain string) (*gtsmodel.DomainAllow, error)
+
+	// GetDomainAllowByID returns one instance-level domain allow with the given id, if it exists.
+	GetDomainAllowByID(ctx context.Context, id string) (*gtsmodel.DomainAllow, error)
+
+	// GetDomainAllows returns all instance-level domain allows currently enforced by this instance.
+	GetDomainAllows(ctx context.Context) ([]*gtsmodel.DomainAllow, error)
+
+	// DeleteDomainAllow deletes an instance-level domain allow with the given domain, if it exists.
+	DeleteDomainAllow(ctx context.Context, domain string) error
+
 	// CreateDomainBlock puts the given instance-level domain block into the database.
 	CreateDomainBlock(ctx context.Context, block *gtsmodel.DomainBlock) error
 
@@ -41,15 +60,22 @@ type Domain interface {
 	// DeleteDomainBlock deletes an instance-level domain block with the given domain, if it exists.
 	DeleteDomainBlock(ctx context.Context, domain string) error
 
-	// IsDomainBlocked checks if an instance-level domain block exists for the given domain string (eg., `example.org`).
+	/*
+		Block/allow checking functions.
+	*/
+
+	// IsDomainBlocked checks if domain is blocked, accounting for both explicit allows and blocks.
+	// Will check allows first, so an allowed domain will always return false, even if it's also blocked.
 	IsDomainBlocked(ctx context.Context, domain string) (bool, error)
 
-	// AreDomainsBlocked checks if an instance-level domain block exists for any of the given domains strings, and returns true if even one is found.
+	// AreDomainsBlocked calls IsDomainBlocked for each domain.
+	// Will return true if even one of the given domains is blocked.
 	AreDomainsBlocked(ctx context.Context, domains []string) (bool, error)
 
-	// IsURIBlocked checks if an instance-level domain block exists for the `host` in the given URI (eg., `https://example.org/users/whatever`).
+	// IsURIBlocked calls IsDomainBlocked for the host of the given URI.
 	IsURIBlocked(ctx context.Context, uri *url.URL) (bool, error)
 
-	// AreURIsBlocked checks if an instance-level domain block exists for any `host` in the given URI slice, and returns true if even one is found.
+	// AreURIsBlocked calls IsURIBlocked for each URI.
+	// Will return true if even one of the given URIs is blocked.
 	AreURIsBlocked(ctx context.Context, uris []*url.URL) (bool, error)
 }
diff --git a/internal/gtsmodel/adminaction.go b/internal/gtsmodel/adminaction.go
index 1e55a33f9..e8b82e495 100644
--- a/internal/gtsmodel/adminaction.go
+++ b/internal/gtsmodel/adminaction.go
@@ -42,7 +42,7 @@ func (c AdminActionCategory) String() string {
 	case AdminActionCategoryDomain:
 		return "domain"
 	default:
-		return "unknown"
+		return "unknown" //nolint:goconst
 	}
 }
 
diff --git a/internal/gtsmodel/domainallow.go b/internal/gtsmodel/domainallow.go
new file mode 100644
index 000000000..2a3e53e79
--- /dev/null
+++ b/internal/gtsmodel/domainallow.go
@@ -0,0 +1,78 @@
+// GoToSocial
+// Copyright (C) GoToSocial Authors admin@gotosocial.org
+// SPDX-License-Identifier: AGPL-3.0-or-later
+//
+// This program is free software: you can redistribute it and/or modify
+// it under the terms of the GNU Affero General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+// GNU Affero General Public License for more details.
+//
+// You should have received a copy of the GNU Affero General Public License
+// along with this program.  If not, see .
+
+package gtsmodel
+
+import "time"
+
+// DomainAllow represents a federation allow towards a particular domain.
+type DomainAllow struct {
+	ID                 string    `bun:"type:CHAR(26),pk,nullzero,notnull,unique"`                    // id of this item in the database
+	CreatedAt          time.Time `bun:"type:timestamptz,nullzero,notnull,default:current_timestamp"` // when was item created
+	UpdatedAt          time.Time `bun:"type:timestamptz,nullzero,notnull,default:current_timestamp"` // when was item last updated
+	Domain             string    `bun:",nullzero,notnull"`                                           // domain to allow. Eg. 'whatever.com'
+	CreatedByAccountID string    `bun:"type:CHAR(26),nullzero,notnull"`                              // Account ID of the creator of this allow
+	CreatedByAccount   *Account  `bun:"rel:belongs-to"`                                              // Account corresponding to createdByAccountID
+	PrivateComment     string    `bun:""`                                                            // Private comment on this allow, viewable to admins
+	PublicComment      string    `bun:""`                                                            // Public comment on this allow, viewable (optionally) by everyone
+	Obfuscate          *bool     `bun:",nullzero,notnull,default:false"`                             // whether the domain name should appear obfuscated when displaying it publicly
+	SubscriptionID     string    `bun:"type:CHAR(26),nullzero"`                                      // if this allow was created through a subscription, what's the subscription ID?
+}
+
+func (d *DomainAllow) GetID() string {
+	return d.ID
+}
+
+func (d *DomainAllow) GetCreatedAt() time.Time {
+	return d.CreatedAt
+}
+
+func (d *DomainAllow) GetUpdatedAt() time.Time {
+	return d.UpdatedAt
+}
+
+func (d *DomainAllow) GetDomain() string {
+	return d.Domain
+}
+
+func (d *DomainAllow) GetCreatedByAccountID() string {
+	return d.CreatedByAccountID
+}
+
+func (d *DomainAllow) GetCreatedByAccount() *Account {
+	return d.CreatedByAccount
+}
+
+func (d *DomainAllow) GetPrivateComment() string {
+	return d.PrivateComment
+}
+
+func (d *DomainAllow) GetPublicComment() string {
+	return d.PublicComment
+}
+
+func (d *DomainAllow) GetObfuscate() *bool {
+	return d.Obfuscate
+}
+
+func (d *DomainAllow) GetSubscriptionID() string {
+	return d.SubscriptionID
+}
+
+func (d *DomainAllow) GetType() DomainPermissionType {
+	return DomainPermissionAllow
+}
diff --git a/internal/gtsmodel/domainblock.go b/internal/gtsmodel/domainblock.go
index dfe642ef5..4e0b3ca65 100644
--- a/internal/gtsmodel/domainblock.go
+++ b/internal/gtsmodel/domainblock.go
@@ -32,3 +32,47 @@ type DomainBlock struct {
 	Obfuscate          *bool     `bun:",nullzero,notnull,default:false"`                             // whether the domain name should appear obfuscated when displaying it publicly
 	SubscriptionID     string    `bun:"type:CHAR(26),nullzero"`                                      // if this block was created through a subscription, what's the subscription ID?
 }
+
+func (d *DomainBlock) GetID() string {
+	return d.ID
+}
+
+func (d *DomainBlock) GetCreatedAt() time.Time {
+	return d.CreatedAt
+}
+
+func (d *DomainBlock) GetUpdatedAt() time.Time {
+	return d.UpdatedAt
+}
+
+func (d *DomainBlock) GetDomain() string {
+	return d.Domain
+}
+
+func (d *DomainBlock) GetCreatedByAccountID() string {
+	return d.CreatedByAccountID
+}
+
+func (d *DomainBlock) GetCreatedByAccount() *Account {
+	return d.CreatedByAccount
+}
+
+func (d *DomainBlock) GetPrivateComment() string {
+	return d.PrivateComment
+}
+
+func (d *DomainBlock) GetPublicComment() string {
+	return d.PublicComment
+}
+
+func (d *DomainBlock) GetObfuscate() *bool {
+	return d.Obfuscate
+}
+
+func (d *DomainBlock) GetSubscriptionID() string {
+	return d.SubscriptionID
+}
+
+func (d *DomainBlock) GetType() DomainPermissionType {
+	return DomainPermissionBlock
+}
diff --git a/internal/gtsmodel/domainpermission.go b/internal/gtsmodel/domainpermission.go
new file mode 100644
index 000000000..01e8fdaaa
--- /dev/null
+++ b/internal/gtsmodel/domainpermission.go
@@ -0,0 +1,67 @@
+// GoToSocial
+// Copyright (C) GoToSocial Authors admin@gotosocial.org
+// SPDX-License-Identifier: AGPL-3.0-or-later
+//
+// This program is free software: you can redistribute it and/or modify
+// it under the terms of the GNU Affero General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+// GNU Affero General Public License for more details.
+//
+// You should have received a copy of the GNU Affero General Public License
+// along with this program.  If not, see .
+
+package gtsmodel
+
+import "time"
+
+// DomainPermission models a domain
+// permission entry (block/allow).
+type DomainPermission interface {
+	GetID() string
+	GetCreatedAt() time.Time
+	GetUpdatedAt() time.Time
+	GetDomain() string
+	GetCreatedByAccountID() string
+	GetCreatedByAccount() *Account
+	GetPrivateComment() string
+	GetPublicComment() string
+	GetObfuscate() *bool
+	GetSubscriptionID() string
+	GetType() DomainPermissionType
+}
+
+// Domain permission type.
+type DomainPermissionType uint8
+
+const (
+	DomainPermissionUnknown DomainPermissionType = iota
+	DomainPermissionBlock                        // Explicitly block a domain.
+	DomainPermissionAllow                        // Explicitly allow a domain.
+)
+
+func (p DomainPermissionType) String() string {
+	switch p {
+	case DomainPermissionBlock:
+		return "block"
+	case DomainPermissionAllow:
+		return "allow"
+	default:
+		return "unknown"
+	}
+}
+
+func NewDomainPermissionType(in string) DomainPermissionType {
+	switch in {
+	case "block":
+		return DomainPermissionBlock
+	case "allow":
+		return DomainPermissionAllow
+	default:
+		return DomainPermissionUnknown
+	}
+}
diff --git a/internal/processing/admin/domainallow.go b/internal/processing/admin/domainallow.go
new file mode 100644
index 000000000..bab54e308
--- /dev/null
+++ b/internal/processing/admin/domainallow.go
@@ -0,0 +1,255 @@
+// GoToSocial
+// Copyright (C) GoToSocial Authors admin@gotosocial.org
+// SPDX-License-Identifier: AGPL-3.0-or-later
+//
+// This program is free software: you can redistribute it and/or modify
+// it under the terms of the GNU Affero General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+// GNU Affero General Public License for more details.
+//
+// You should have received a copy of the GNU Affero General Public License
+// along with this program.  If not, see .
+
+package admin
+
+import (
+	"context"
+	"errors"
+	"fmt"
+
+	"codeberg.org/gruf/go-kv"
+	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
+	"github.com/superseriousbusiness/gotosocial/internal/config"
+	"github.com/superseriousbusiness/gotosocial/internal/db"
+	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
+	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
+	"github.com/superseriousbusiness/gotosocial/internal/id"
+	"github.com/superseriousbusiness/gotosocial/internal/log"
+	"github.com/superseriousbusiness/gotosocial/internal/text"
+)
+
+func (p *Processor) createDomainAllow(
+	ctx context.Context,
+	adminAcct *gtsmodel.Account,
+	domain string,
+	obfuscate bool,
+	publicComment string,
+	privateComment string,
+	subscriptionID string,
+) (*apimodel.DomainPermission, string, gtserror.WithCode) {
+	// Check if an allow already exists for this domain.
+	domainAllow, err := p.state.DB.GetDomainAllow(ctx, domain)
+	if err != nil && !errors.Is(err, db.ErrNoEntries) {
+		// Something went wrong in the DB.
+		err = gtserror.Newf("db error getting domain allow %s: %w", domain, err)
+		return nil, "", gtserror.NewErrorInternalError(err)
+	}
+
+	if domainAllow == nil {
+		// No allow exists yet, create it.
+		domainAllow = >smodel.DomainAllow{
+			ID:                 id.NewULID(),
+			Domain:             domain,
+			CreatedByAccountID: adminAcct.ID,
+			PrivateComment:     text.SanitizeToPlaintext(privateComment),
+			PublicComment:      text.SanitizeToPlaintext(publicComment),
+			Obfuscate:          &obfuscate,
+			SubscriptionID:     subscriptionID,
+		}
+
+		// Insert the new allow into the database.
+		if err := p.state.DB.CreateDomainAllow(ctx, domainAllow); err != nil {
+			err = gtserror.Newf("db error putting domain allow %s: %w", domain, err)
+			return nil, "", gtserror.NewErrorInternalError(err)
+		}
+	}
+
+	actionID := id.NewULID()
+
+	// Process domain allow side
+	// effects asynchronously.
+	if errWithCode := p.actions.Run(
+		ctx,
+		>smodel.AdminAction{
+			ID:             actionID,
+			TargetCategory: gtsmodel.AdminActionCategoryDomain,
+			TargetID:       domain,
+			Type:           gtsmodel.AdminActionSuspend,
+			AccountID:      adminAcct.ID,
+			Text:           domainAllow.PrivateComment,
+		},
+		func(ctx context.Context) gtserror.MultiError {
+			// Log start + finish.
+			l := log.WithFields(kv.Fields{
+				{"domain", domain},
+				{"actionID", actionID},
+			}...).WithContext(ctx)
+
+			l.Info("processing domain allow side effects")
+			defer func() { l.Info("finished processing domain allow side effects") }()
+
+			return p.domainAllowSideEffects(ctx, domainAllow)
+		},
+	); errWithCode != nil {
+		return nil, actionID, errWithCode
+	}
+
+	apiDomainAllow, errWithCode := p.apiDomainPerm(ctx, domainAllow, false)
+	if errWithCode != nil {
+		return nil, actionID, errWithCode
+	}
+
+	return apiDomainAllow, actionID, nil
+}
+
+func (p *Processor) domainAllowSideEffects(
+	ctx context.Context,
+	allow *gtsmodel.DomainAllow,
+) gtserror.MultiError {
+	if config.GetInstanceFederationMode() == config.InstanceFederationModeAllowlist {
+		// We're running in allowlist mode,
+		// so there are no side effects to
+		// process here.
+		return nil
+	}
+
+	// We're running in blocklist mode or
+	// some similar mode which necessitates
+	// domain allow side effects if a block
+	// was in place when the allow was created.
+	//
+	// So, check if there's a block.
+	block, err := p.state.DB.GetDomainBlock(ctx, allow.Domain)
+	if err != nil && !errors.Is(err, db.ErrNoEntries) {
+		errs := gtserror.NewMultiError(1)
+		errs.Appendf("db error getting domain block %s: %w", allow.Domain, err)
+		return errs
+	}
+
+	if block == nil {
+		// No block?
+		// No problem!
+		return nil
+	}
+
+	// There was a block, over which the new
+	// allow ought to take precedence. To account
+	// for this, just run side effects as though
+	// the domain was being unblocked, while
+	// leaving the existing block in place.
+	//
+	// Any accounts that were suspended by
+	// the block will be unsuspended and be
+	// able to interact with the instance again.
+	return p.domainUnblockSideEffects(ctx, block)
+}
+
+func (p *Processor) deleteDomainAllow(
+	ctx context.Context,
+	adminAcct *gtsmodel.Account,
+	domainAllowID string,
+) (*apimodel.DomainPermission, string, gtserror.WithCode) {
+	domainAllow, err := p.state.DB.GetDomainAllowByID(ctx, domainAllowID)
+	if err != nil {
+		if !errors.Is(err, db.ErrNoEntries) {
+			// Real error.
+			err = gtserror.Newf("db error getting domain allow: %w", err)
+			return nil, "", gtserror.NewErrorInternalError(err)
+		}
+
+		// There are just no entries for this ID.
+		err = fmt.Errorf("no domain allow entry exists with ID %s", domainAllowID)
+		return nil, "", gtserror.NewErrorNotFound(err, err.Error())
+	}
+
+	// Prepare the domain allow to return, *before* the deletion goes through.
+	apiDomainAllow, errWithCode := p.apiDomainPerm(ctx, domainAllow, false)
+	if errWithCode != nil {
+		return nil, "", errWithCode
+	}
+
+	// Delete the original domain allow.
+	if err := p.state.DB.DeleteDomainAllow(ctx, domainAllow.Domain); err != nil {
+		err = gtserror.Newf("db error deleting domain allow: %w", err)
+		return nil, "", gtserror.NewErrorInternalError(err)
+	}
+
+	actionID := id.NewULID()
+
+	// Process domain unallow side
+	// effects asynchronously.
+	if errWithCode := p.actions.Run(
+		ctx,
+		>smodel.AdminAction{
+			ID:             actionID,
+			TargetCategory: gtsmodel.AdminActionCategoryDomain,
+			TargetID:       domainAllow.Domain,
+			Type:           gtsmodel.AdminActionUnsuspend,
+			AccountID:      adminAcct.ID,
+		},
+		func(ctx context.Context) gtserror.MultiError {
+			// Log start + finish.
+			l := log.WithFields(kv.Fields{
+				{"domain", domainAllow.Domain},
+				{"actionID", actionID},
+			}...).WithContext(ctx)
+
+			l.Info("processing domain unallow side effects")
+			defer func() { l.Info("finished processing domain unallow side effects") }()
+
+			return p.domainUnallowSideEffects(ctx, domainAllow)
+		},
+	); errWithCode != nil {
+		return nil, actionID, errWithCode
+	}
+
+	return apiDomainAllow, actionID, nil
+}
+
+func (p *Processor) domainUnallowSideEffects(
+	ctx context.Context,
+	allow *gtsmodel.DomainAllow,
+) gtserror.MultiError {
+	if config.GetInstanceFederationMode() == config.InstanceFederationModeAllowlist {
+		// We're running in allowlist mode,
+		// so there are no side effects to
+		// process here.
+		return nil
+	}
+
+	// We're running in blocklist mode or
+	// some similar mode which necessitates
+	// domain allow side effects if a block
+	// was in place when the allow was removed.
+	//
+	// So, check if there's a block.
+	block, err := p.state.DB.GetDomainBlock(ctx, allow.Domain)
+	if err != nil && !errors.Is(err, db.ErrNoEntries) {
+		errs := gtserror.NewMultiError(1)
+		errs.Appendf("db error getting domain block %s: %w", allow.Domain, err)
+		return errs
+	}
+
+	if block == nil {
+		// No block?
+		// No problem!
+		return nil
+	}
+
+	// There was a block, over which the previous
+	// allow was taking precedence. Now that the
+	// allow has been removed, we should put the
+	// side effects of the block back in place.
+	//
+	// To do this, process the block side effects
+	// again as though the block were freshly
+	// created. This will mark all accounts from
+	// the blocked domain as suspended, and clean
+	// up their follows/following, media, etc.
+	return p.domainBlockSideEffects(ctx, block)
+}
diff --git a/internal/processing/admin/domainblock.go b/internal/processing/admin/domainblock.go
index 1262bf6b0..4161ec12f 100644
--- a/internal/processing/admin/domainblock.go
+++ b/internal/processing/admin/domainblock.go
@@ -18,14 +18,9 @@
 package admin
 
 import (
-	"bytes"
 	"context"
-	"encoding/json"
 	"errors"
 	"fmt"
-	"io"
-	"mime/multipart"
-	"net/http"
 	"time"
 
 	"codeberg.org/gruf/go-kv"
@@ -40,14 +35,7 @@ import (
 	"github.com/superseriousbusiness/gotosocial/internal/text"
 )
 
-// DomainBlockCreate creates an instance-level block against the given domain,
-// and then processes side effects of that block (deleting accounts, media, etc).
-//
-// If a domain block already exists for the domain, side effects will be retried.
-//
-// Return values for this function are the (new) domain block, the ID of the admin
-// action resulting from this call, and/or an error if something goes wrong.
-func (p *Processor) DomainBlockCreate(
+func (p *Processor) createDomainBlock(
 	ctx context.Context,
 	adminAcct *gtsmodel.Account,
 	domain string,
@@ -55,7 +43,7 @@ func (p *Processor) DomainBlockCreate(
 	publicComment string,
 	privateComment string,
 	subscriptionID string,
-) (*apimodel.DomainBlock, string, gtserror.WithCode) {
+) (*apimodel.DomainPermission, string, gtserror.WithCode) {
 	// Check if a block already exists for this domain.
 	domainBlock, err := p.state.DB.GetDomainBlock(ctx, domain)
 	if err != nil && !errors.Is(err, db.ErrNoEntries) {
@@ -98,13 +86,22 @@ func (p *Processor) DomainBlockCreate(
 			Text:           domainBlock.PrivateComment,
 		},
 		func(ctx context.Context) gtserror.MultiError {
+			// Log start + finish.
+			l := log.WithFields(kv.Fields{
+				{"domain", domain},
+				{"actionID", actionID},
+			}...).WithContext(ctx)
+
+			l.Info("processing domain block side effects")
+			defer func() { l.Info("finished processing domain block side effects") }()
+
 			return p.domainBlockSideEffects(ctx, domainBlock)
 		},
 	); errWithCode != nil {
 		return nil, actionID, errWithCode
 	}
 
-	apiDomainBlock, errWithCode := p.apiDomainBlock(ctx, domainBlock)
+	apiDomainBlock, errWithCode := p.apiDomainPerm(ctx, domainBlock, false)
 	if errWithCode != nil {
 		return nil, actionID, errWithCode
 	}
@@ -112,206 +109,6 @@ func (p *Processor) DomainBlockCreate(
 	return apiDomainBlock, actionID, nil
 }
 
-// DomainBlockDelete removes one domain block with the given ID,
-// and processes side effects of removing the block asynchronously.
-//
-// Return values for this function are the deleted domain block, the ID of the admin
-// action resulting from this call, and/or an error if something goes wrong.
-func (p *Processor) DomainBlockDelete(
-	ctx context.Context,
-	adminAcct *gtsmodel.Account,
-	domainBlockID string,
-) (*apimodel.DomainBlock, string, gtserror.WithCode) {
-	domainBlock, err := p.state.DB.GetDomainBlockByID(ctx, domainBlockID)
-	if err != nil {
-		if !errors.Is(err, db.ErrNoEntries) {
-			// Real error.
-			err = gtserror.Newf("db error getting domain block: %w", err)
-			return nil, "", gtserror.NewErrorInternalError(err)
-		}
-
-		// There are just no entries for this ID.
-		err = fmt.Errorf("no domain block entry exists with ID %s", domainBlockID)
-		return nil, "", gtserror.NewErrorNotFound(err, err.Error())
-	}
-
-	// Prepare the domain block to return, *before* the deletion goes through.
-	apiDomainBlock, errWithCode := p.apiDomainBlock(ctx, domainBlock)
-	if errWithCode != nil {
-		return nil, "", errWithCode
-	}
-
-	// Copy value of the domain block.
-	domainBlockC := new(gtsmodel.DomainBlock)
-	*domainBlockC = *domainBlock
-
-	// Delete the original domain block.
-	if err := p.state.DB.DeleteDomainBlock(ctx, domainBlock.Domain); err != nil {
-		err = gtserror.Newf("db error deleting domain block: %w", err)
-		return nil, "", gtserror.NewErrorInternalError(err)
-	}
-
-	actionID := id.NewULID()
-
-	// Process domain unblock side
-	// effects asynchronously.
-	if errWithCode := p.actions.Run(
-		ctx,
-		>smodel.AdminAction{
-			ID:             actionID,
-			TargetCategory: gtsmodel.AdminActionCategoryDomain,
-			TargetID:       domainBlockC.Domain,
-			Type:           gtsmodel.AdminActionUnsuspend,
-			AccountID:      adminAcct.ID,
-		},
-		func(ctx context.Context) gtserror.MultiError {
-			return p.domainUnblockSideEffects(ctx, domainBlock)
-		},
-	); errWithCode != nil {
-		return nil, actionID, errWithCode
-	}
-
-	return apiDomainBlock, actionID, nil
-}
-
-// DomainBlocksImport handles the import of multiple domain blocks,
-// by calling the DomainBlockCreate function for each domain in the
-// provided file. Will return a slice of processed domain blocks.
-//
-// In the case of total failure, a gtserror.WithCode will be returned
-// so that the caller can respond appropriately. In the case of
-// partial or total success, a MultiStatus model will be returned,
-// which contains information about success/failure count, so that
-// the caller can retry any failures as they wish.
-func (p *Processor) DomainBlocksImport(
-	ctx context.Context,
-	account *gtsmodel.Account,
-	domainsF *multipart.FileHeader,
-) (*apimodel.MultiStatus, gtserror.WithCode) {
-	// Open the provided file.
-	file, err := domainsF.Open()
-	if err != nil {
-		err = gtserror.Newf("error opening attachment: %w", err)
-		return nil, gtserror.NewErrorBadRequest(err, err.Error())
-	}
-	defer file.Close()
-
-	// Copy the file contents into a buffer.
-	buf := new(bytes.Buffer)
-	size, err := io.Copy(buf, file)
-	if err != nil {
-		err = gtserror.Newf("error reading attachment: %w", err)
-		return nil, gtserror.NewErrorBadRequest(err, err.Error())
-	}
-
-	// Ensure we actually read something.
-	if size == 0 {
-		err = gtserror.New("error reading attachment: size 0 bytes")
-		return nil, gtserror.NewErrorBadRequest(err, err.Error())
-	}
-
-	// Parse bytes as slice of domain blocks.
-	domainBlocks := make([]*apimodel.DomainBlock, 0)
-	if err := json.Unmarshal(buf.Bytes(), &domainBlocks); err != nil {
-		err = gtserror.Newf("error parsing attachment as domain blocks: %w", err)
-		return nil, gtserror.NewErrorBadRequest(err, err.Error())
-	}
-
-	count := len(domainBlocks)
-	if count == 0 {
-		err = gtserror.New("error importing domain blocks: 0 entries provided")
-		return nil, gtserror.NewErrorBadRequest(err, err.Error())
-	}
-
-	// Try to process each domain block, differentiating
-	// between successes and errors so that the caller can
-	// try failed imports again if desired.
-	multiStatusEntries := make([]apimodel.MultiStatusEntry, 0, count)
-
-	for _, domainBlock := range domainBlocks {
-		var (
-			domain         = domainBlock.Domain.Domain
-			obfuscate      = domainBlock.Obfuscate
-			publicComment  = domainBlock.PublicComment
-			privateComment = domainBlock.PrivateComment
-			subscriptionID = "" // No sub ID for imports.
-			errWithCode    gtserror.WithCode
-		)
-
-		domainBlock, _, errWithCode = p.DomainBlockCreate(
-			ctx,
-			account,
-			domain,
-			obfuscate,
-			publicComment,
-			privateComment,
-			subscriptionID,
-		)
-
-		var entry *apimodel.MultiStatusEntry
-
-		if errWithCode != nil {
-			entry = &apimodel.MultiStatusEntry{
-				// Use the failed domain entry as the resource value.
-				Resource: domain,
-				Message:  errWithCode.Safe(),
-				Status:   errWithCode.Code(),
-			}
-		} else {
-			entry = &apimodel.MultiStatusEntry{
-				// Use successfully created API model domain block as the resource value.
-				Resource: domainBlock,
-				Message:  http.StatusText(http.StatusOK),
-				Status:   http.StatusOK,
-			}
-		}
-
-		multiStatusEntries = append(multiStatusEntries, *entry)
-	}
-
-	return apimodel.NewMultiStatus(multiStatusEntries), nil
-}
-
-// DomainBlocksGet returns all existing domain blocks. If export is
-// true, the format will be suitable for writing out to an export.
-func (p *Processor) DomainBlocksGet(ctx context.Context, account *gtsmodel.Account, export bool) ([]*apimodel.DomainBlock, gtserror.WithCode) {
-	domainBlocks, err := p.state.DB.GetDomainBlocks(ctx)
-	if err != nil && !errors.Is(err, db.ErrNoEntries) {
-		err = gtserror.Newf("db error getting domain blocks: %w", err)
-		return nil, gtserror.NewErrorInternalError(err)
-	}
-
-	apiDomainBlocks := make([]*apimodel.DomainBlock, 0, len(domainBlocks))
-	for _, domainBlock := range domainBlocks {
-		apiDomainBlock, errWithCode := p.apiDomainBlock(ctx, domainBlock)
-		if errWithCode != nil {
-			return nil, errWithCode
-		}
-
-		apiDomainBlocks = append(apiDomainBlocks, apiDomainBlock)
-	}
-
-	return apiDomainBlocks, nil
-}
-
-// DomainBlockGet returns one domain block with the given id. If export
-// is true, the format will be suitable for writing out to an export.
-func (p *Processor) DomainBlockGet(ctx context.Context, id string, export bool) (*apimodel.DomainBlock, gtserror.WithCode) {
-	domainBlock, err := p.state.DB.GetDomainBlockByID(ctx, id)
-	if err != nil {
-		if errors.Is(err, db.ErrNoEntries) {
-			err = fmt.Errorf("no domain block exists with id %s", id)
-			return nil, gtserror.NewErrorNotFound(err, err.Error())
-		}
-
-		// Something went wrong in the DB.
-		err = gtserror.Newf("db error getting domain block %s: %w", id, err)
-		return nil, gtserror.NewErrorInternalError(err)
-	}
-
-	return p.apiDomainBlock(ctx, domainBlock)
-}
-
 // domainBlockSideEffects processes the side effects of a domain block:
 //
 //  1. Strip most info away from the instance entry for the domain.
@@ -323,13 +120,6 @@ func (p *Processor) domainBlockSideEffects(
 	ctx context.Context,
 	block *gtsmodel.DomainBlock,
 ) gtserror.MultiError {
-	l := log.
-		WithContext(ctx).
-		WithFields(kv.Fields{
-			{"domain", block.Domain},
-		}...)
-	l.Debug("processing domain block side effects")
-
 	var errs gtserror.MultiError
 
 	// If we have an instance entry for this domain,
@@ -347,7 +137,6 @@ func (p *Processor) domainBlockSideEffects(
 			errs.Appendf("db error updating instance: %w", err)
 			return errs
 		}
-		l.Debug("instance entry updated")
 	}
 
 	// For each account that belongs to this domain,
@@ -372,6 +161,68 @@ func (p *Processor) domainBlockSideEffects(
 	return errs
 }
 
+func (p *Processor) deleteDomainBlock(
+	ctx context.Context,
+	adminAcct *gtsmodel.Account,
+	domainBlockID string,
+) (*apimodel.DomainPermission, string, gtserror.WithCode) {
+	domainBlock, err := p.state.DB.GetDomainBlockByID(ctx, domainBlockID)
+	if err != nil {
+		if !errors.Is(err, db.ErrNoEntries) {
+			// Real error.
+			err = gtserror.Newf("db error getting domain block: %w", err)
+			return nil, "", gtserror.NewErrorInternalError(err)
+		}
+
+		// There are just no entries for this ID.
+		err = fmt.Errorf("no domain block entry exists with ID %s", domainBlockID)
+		return nil, "", gtserror.NewErrorNotFound(err, err.Error())
+	}
+
+	// Prepare the domain block to return, *before* the deletion goes through.
+	apiDomainBlock, errWithCode := p.apiDomainPerm(ctx, domainBlock, false)
+	if errWithCode != nil {
+		return nil, "", errWithCode
+	}
+
+	// Delete the original domain block.
+	if err := p.state.DB.DeleteDomainBlock(ctx, domainBlock.Domain); err != nil {
+		err = gtserror.Newf("db error deleting domain block: %w", err)
+		return nil, "", gtserror.NewErrorInternalError(err)
+	}
+
+	actionID := id.NewULID()
+
+	// Process domain unblock side
+	// effects asynchronously.
+	if errWithCode := p.actions.Run(
+		ctx,
+		>smodel.AdminAction{
+			ID:             actionID,
+			TargetCategory: gtsmodel.AdminActionCategoryDomain,
+			TargetID:       domainBlock.Domain,
+			Type:           gtsmodel.AdminActionUnsuspend,
+			AccountID:      adminAcct.ID,
+		},
+		func(ctx context.Context) gtserror.MultiError {
+			// Log start + finish.
+			l := log.WithFields(kv.Fields{
+				{"domain", domainBlock.Domain},
+				{"actionID", actionID},
+			}...).WithContext(ctx)
+
+			l.Info("processing domain unblock side effects")
+			defer func() { l.Info("finished processing domain unblock side effects") }()
+
+			return p.domainUnblockSideEffects(ctx, domainBlock)
+		},
+	); errWithCode != nil {
+		return nil, actionID, errWithCode
+	}
+
+	return apiDomainBlock, actionID, nil
+}
+
 // domainUnblockSideEffects processes the side effects of undoing a
 // domain block:
 //
@@ -385,13 +236,6 @@ func (p *Processor) domainUnblockSideEffects(
 	ctx context.Context,
 	block *gtsmodel.DomainBlock,
 ) gtserror.MultiError {
-	l := log.
-		WithContext(ctx).
-		WithFields(kv.Fields{
-			{"domain", block.Domain},
-		}...)
-	l.Debug("processing domain unblock side effects")
-
 	var errs gtserror.MultiError
 
 	// Update instance entry for this domain, if we have it.
@@ -414,7 +258,6 @@ func (p *Processor) domainUnblockSideEffects(
 			errs.Appendf("db error updating instance: %w", err)
 			return errs
 		}
-		l.Debug("instance entry updated")
 	}
 
 	// Unsuspend all accounts whose suspension origin was this domain block.
diff --git a/internal/processing/admin/domainblock_test.go b/internal/processing/admin/domainblock_test.go
deleted file mode 100644
index 9525ce7c3..000000000
--- a/internal/processing/admin/domainblock_test.go
+++ /dev/null
@@ -1,76 +0,0 @@
-// GoToSocial
-// Copyright (C) GoToSocial Authors admin@gotosocial.org
-// SPDX-License-Identifier: AGPL-3.0-or-later
-//
-// This program is free software: you can redistribute it and/or modify
-// it under the terms of the GNU Affero General Public License as published by
-// the Free Software Foundation, either version 3 of the License, or
-// (at your option) any later version.
-//
-// This program is distributed in the hope that it will be useful,
-// but WITHOUT ANY WARRANTY; without even the implied warranty of
-// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
-// GNU Affero General Public License for more details.
-//
-// You should have received a copy of the GNU Affero General Public License
-// along with this program.  If not, see .
-
-package admin_test
-
-import (
-	"context"
-	"testing"
-
-	"github.com/stretchr/testify/suite"
-	"github.com/superseriousbusiness/gotosocial/testrig"
-)
-
-type DomainBlockTestSuite struct {
-	AdminStandardTestSuite
-}
-
-func (suite *DomainBlockTestSuite) TestCreateDomainBlock() {
-	var (
-		ctx            = context.Background()
-		adminAcct      = suite.testAccounts["admin_account"]
-		domain         = "fossbros-anonymous.io"
-		obfuscate      = false
-		publicComment  = ""
-		privateComment = ""
-		subscriptionID = ""
-	)
-
-	apiBlock, actionID, errWithCode := suite.adminProcessor.DomainBlockCreate(
-		ctx,
-		adminAcct,
-		domain,
-		obfuscate,
-		publicComment,
-		privateComment,
-		subscriptionID,
-	)
-	suite.NoError(errWithCode)
-	suite.NotNil(apiBlock)
-	suite.NotEmpty(actionID)
-
-	// Wait for action to finish.
-	if !testrig.WaitFor(func() bool {
-		return suite.adminProcessor.Actions().TotalRunning() == 0
-	}) {
-		suite.FailNow("timed out waiting for admin action(s) to finish")
-	}
-
-	// Ensure action marked as
-	// completed in the database.
-	adminAction, err := suite.db.GetAdminAction(ctx, actionID)
-	if err != nil {
-		suite.FailNow(err.Error())
-	}
-
-	suite.NotZero(adminAction.CompletedAt)
-	suite.Empty(adminAction.Errors)
-}
-
-func TestDomainBlockTestSuite(t *testing.T) {
-	suite.Run(t, new(DomainBlockTestSuite))
-}
diff --git a/internal/processing/admin/domainpermission.go b/internal/processing/admin/domainpermission.go
new file mode 100644
index 000000000..c759c0f11
--- /dev/null
+++ b/internal/processing/admin/domainpermission.go
@@ -0,0 +1,335 @@
+// GoToSocial
+// Copyright (C) GoToSocial Authors admin@gotosocial.org
+// SPDX-License-Identifier: AGPL-3.0-or-later
+//
+// This program is free software: you can redistribute it and/or modify
+// it under the terms of the GNU Affero General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+// GNU Affero General Public License for more details.
+//
+// You should have received a copy of the GNU Affero General Public License
+// along with this program.  If not, see .
+
+package admin
+
+import (
+	"context"
+	"encoding/json"
+	"errors"
+	"fmt"
+	"mime/multipart"
+	"net/http"
+
+	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
+	"github.com/superseriousbusiness/gotosocial/internal/db"
+	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
+	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
+)
+
+// apiDomainPerm is a cheeky shortcut for returning
+// the API version of the given domain permission
+// (*gtsmodel.DomainBlock or *gtsmodel.DomainAllow),
+// or an appropriate error if something goes wrong.
+func (p *Processor) apiDomainPerm(
+	ctx context.Context,
+	domainPermission gtsmodel.DomainPermission,
+	export bool,
+) (*apimodel.DomainPermission, gtserror.WithCode) {
+	apiDomainPerm, err := p.tc.DomainPermToAPIDomainPerm(ctx, domainPermission, export)
+	if err != nil {
+		err := gtserror.NewfAt(3, "error converting domain permission to api model: %w", err)
+		return nil, gtserror.NewErrorInternalError(err)
+	}
+
+	return apiDomainPerm, nil
+}
+
+// DomainPermissionCreate creates an instance-level permission
+// targeting the given domain, and then processes any side
+// effects of the permission creation.
+//
+// If the same permission type already exists for the domain,
+// side effects will be retried.
+//
+// Return values for this function are the new or existing
+// domain permission, the ID of the admin action resulting
+// from this call, and/or an error if something goes wrong.
+func (p *Processor) DomainPermissionCreate(
+	ctx context.Context,
+	permissionType gtsmodel.DomainPermissionType,
+	adminAcct *gtsmodel.Account,
+	domain string,
+	obfuscate bool,
+	publicComment string,
+	privateComment string,
+	subscriptionID string,
+) (*apimodel.DomainPermission, string, gtserror.WithCode) {
+	switch permissionType {
+
+	// Explicitly block a domain.
+	case gtsmodel.DomainPermissionBlock:
+		return p.createDomainBlock(
+			ctx,
+			adminAcct,
+			domain,
+			obfuscate,
+			publicComment,
+			privateComment,
+			subscriptionID,
+		)
+
+	// Explicitly allow a domain.
+	case gtsmodel.DomainPermissionAllow:
+		return p.createDomainAllow(
+			ctx,
+			adminAcct,
+			domain,
+			obfuscate,
+			publicComment,
+			privateComment,
+			subscriptionID,
+		)
+
+	// Weeping, roaring, red-faced.
+	default:
+		err := gtserror.Newf("unrecognized permission type %d", permissionType)
+		return nil, "", gtserror.NewErrorInternalError(err)
+	}
+}
+
+// DomainPermissionDelete removes one domain block with the given ID,
+// and processes side effects of removing the block asynchronously.
+//
+// Return values for this function are the deleted domain block, the ID of the admin
+// action resulting from this call, and/or an error if something goes wrong.
+func (p *Processor) DomainPermissionDelete(
+	ctx context.Context,
+	permissionType gtsmodel.DomainPermissionType,
+	adminAcct *gtsmodel.Account,
+	domainBlockID string,
+) (*apimodel.DomainPermission, string, gtserror.WithCode) {
+	switch permissionType {
+
+	// Delete explicit domain block.
+	case gtsmodel.DomainPermissionBlock:
+		return p.deleteDomainBlock(
+			ctx,
+			adminAcct,
+			domainBlockID,
+		)
+
+	// Delete explicit domain allow.
+	case gtsmodel.DomainPermissionAllow:
+		return p.deleteDomainAllow(
+			ctx,
+			adminAcct,
+			domainBlockID,
+		)
+
+	// You do the hokey-cokey and you turn
+	// around, that's what it's all about.
+	default:
+		err := gtserror.Newf("unrecognized permission type %d", permissionType)
+		return nil, "", gtserror.NewErrorInternalError(err)
+	}
+}
+
+// DomainPermissionsImport handles the import of multiple
+// domain permissions, by calling the DomainPermissionCreate
+// function for each domain in the provided file. Will return
+// a slice of processed domain permissions.
+//
+// In the case of total failure, a gtserror.WithCode will be
+// returned so that the caller can respond appropriately. In
+// the case of partial or total success, a MultiStatus model
+// will be returned, which contains information about success
+// + failure count, so that the caller can retry any failures
+// as they wish.
+func (p *Processor) DomainPermissionsImport(
+	ctx context.Context,
+	permissionType gtsmodel.DomainPermissionType,
+	account *gtsmodel.Account,
+	domainsF *multipart.FileHeader,
+) (*apimodel.MultiStatus, gtserror.WithCode) {
+	// Ensure known permission type.
+	if permissionType != gtsmodel.DomainPermissionBlock &&
+		permissionType != gtsmodel.DomainPermissionAllow {
+		err := gtserror.Newf("unrecognized permission type %d", permissionType)
+		return nil, gtserror.NewErrorInternalError(err)
+	}
+
+	// Open the provided file.
+	file, err := domainsF.Open()
+	if err != nil {
+		err = gtserror.Newf("error opening attachment: %w", err)
+		return nil, gtserror.NewErrorBadRequest(err, err.Error())
+	}
+	defer file.Close()
+
+	// Parse file as slice of domain blocks.
+	domainPerms := make([]*apimodel.DomainPermission, 0)
+	if err := json.NewDecoder(file).Decode(&domainPerms); err != nil {
+		err = gtserror.Newf("error parsing attachment as domain permissions: %w", err)
+		return nil, gtserror.NewErrorBadRequest(err, err.Error())
+	}
+
+	count := len(domainPerms)
+	if count == 0 {
+		err = gtserror.New("error importing domain permissions: 0 entries provided")
+		return nil, gtserror.NewErrorBadRequest(err, err.Error())
+	}
+
+	// Try to process each domain permission, differentiating
+	// between successes and errors so that the caller can
+	// try failed imports again if desired.
+	multiStatusEntries := make([]apimodel.MultiStatusEntry, 0, count)
+
+	for _, domainPerm := range domainPerms {
+		var (
+			domain         = domainPerm.Domain.Domain
+			obfuscate      = domainPerm.Obfuscate
+			publicComment  = domainPerm.PublicComment
+			privateComment = domainPerm.PrivateComment
+			subscriptionID = "" // No sub ID for imports.
+			errWithCode    gtserror.WithCode
+		)
+
+		domainPerm, _, errWithCode = p.DomainPermissionCreate(
+			ctx,
+			permissionType,
+			account,
+			domain,
+			obfuscate,
+			publicComment,
+			privateComment,
+			subscriptionID,
+		)
+
+		var entry *apimodel.MultiStatusEntry
+
+		if errWithCode != nil {
+			entry = &apimodel.MultiStatusEntry{
+				// Use the failed domain entry as the resource value.
+				Resource: domain,
+				Message:  errWithCode.Safe(),
+				Status:   errWithCode.Code(),
+			}
+		} else {
+			entry = &apimodel.MultiStatusEntry{
+				// Use successfully created API model domain block as the resource value.
+				Resource: domainPerm,
+				Message:  http.StatusText(http.StatusOK),
+				Status:   http.StatusOK,
+			}
+		}
+
+		multiStatusEntries = append(multiStatusEntries, *entry)
+	}
+
+	return apimodel.NewMultiStatus(multiStatusEntries), nil
+}
+
+// DomainPermissionsGet returns all existing domain
+// permissions of the requested type. If export is
+// true, the format will be suitable for writing out
+// to an export.
+func (p *Processor) DomainPermissionsGet(
+	ctx context.Context,
+	permissionType gtsmodel.DomainPermissionType,
+	account *gtsmodel.Account,
+	export bool,
+) ([]*apimodel.DomainPermission, gtserror.WithCode) {
+	var (
+		domainPerms []gtsmodel.DomainPermission
+		err         error
+	)
+
+	switch permissionType {
+	case gtsmodel.DomainPermissionBlock:
+		var blocks []*gtsmodel.DomainBlock
+
+		blocks, err = p.state.DB.GetDomainBlocks(ctx)
+		if err != nil {
+			break
+		}
+
+		for _, block := range blocks {
+			domainPerms = append(domainPerms, block)
+		}
+
+	case gtsmodel.DomainPermissionAllow:
+		var allows []*gtsmodel.DomainAllow
+
+		allows, err = p.state.DB.GetDomainAllows(ctx)
+		if err != nil {
+			break
+		}
+
+		for _, allow := range allows {
+			domainPerms = append(domainPerms, allow)
+		}
+
+	default:
+		err = errors.New("unrecognized permission type")
+	}
+
+	if err != nil {
+		err := gtserror.Newf("error getting %ss: %w", permissionType.String(), err)
+		return nil, gtserror.NewErrorInternalError(err)
+	}
+
+	apiDomainPerms := make([]*apimodel.DomainPermission, len(domainPerms))
+	for i, domainPerm := range domainPerms {
+		apiDomainBlock, errWithCode := p.apiDomainPerm(ctx, domainPerm, export)
+		if errWithCode != nil {
+			return nil, errWithCode
+		}
+
+		apiDomainPerms[i] = apiDomainBlock
+	}
+
+	return apiDomainPerms, nil
+}
+
+// DomainPermissionGet returns one domain
+// permission with the given id and type.
+//
+// If export is true, the format will be
+// suitable for writing out to an export.
+func (p *Processor) DomainPermissionGet(
+	ctx context.Context,
+	permissionType gtsmodel.DomainPermissionType,
+	id string,
+	export bool,
+) (*apimodel.DomainPermission, gtserror.WithCode) {
+	var (
+		domainPerm gtsmodel.DomainPermission
+		err        error
+	)
+
+	switch permissionType {
+	case gtsmodel.DomainPermissionBlock:
+		domainPerm, err = p.state.DB.GetDomainBlockByID(ctx, id)
+	case gtsmodel.DomainPermissionAllow:
+		domainPerm, err = p.state.DB.GetDomainAllowByID(ctx, id)
+	default:
+		err = gtserror.New("unrecognized permission type")
+	}
+
+	if err != nil {
+		if errors.Is(err, db.ErrNoEntries) {
+			err = fmt.Errorf("no domain %s exists with id %s", permissionType.String(), id)
+			return nil, gtserror.NewErrorNotFound(err, err.Error())
+		}
+
+		err = gtserror.Newf("error getting domain %s with id %s: %w", permissionType.String(), id, err)
+		return nil, gtserror.NewErrorInternalError(err)
+	}
+
+	return p.apiDomainPerm(ctx, domainPerm, export)
+}
diff --git a/internal/processing/admin/domainpermission_test.go b/internal/processing/admin/domainpermission_test.go
new file mode 100644
index 000000000..b6de226c1
--- /dev/null
+++ b/internal/processing/admin/domainpermission_test.go
@@ -0,0 +1,280 @@
+// GoToSocial
+// Copyright (C) GoToSocial Authors admin@gotosocial.org
+// SPDX-License-Identifier: AGPL-3.0-or-later
+//
+// This program is free software: you can redistribute it and/or modify
+// it under the terms of the GNU Affero General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+// GNU Affero General Public License for more details.
+//
+// You should have received a copy of the GNU Affero General Public License
+// along with this program.  If not, see .
+
+package admin_test
+
+import (
+	"context"
+	"testing"
+
+	"github.com/stretchr/testify/suite"
+	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
+	"github.com/superseriousbusiness/gotosocial/internal/config"
+	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
+	"github.com/superseriousbusiness/gotosocial/testrig"
+)
+
+type DomainBlockTestSuite struct {
+	AdminStandardTestSuite
+}
+
+type domainPermAction struct {
+	// 'create' or 'delete'
+	// the domain permission.
+	createOrDelete string
+
+	// Type of permission
+	// to create or delete.
+	permissionType gtsmodel.DomainPermissionType
+
+	// Domain to target
+	// with the permission.
+	domain string
+
+	// Expected result of this
+	// permission action on each
+	// account on the target domain.
+	// Eg., suite.Zero(account.SuspendedAt)
+	expected func(*gtsmodel.Account) bool
+}
+
+type domainPermTest struct {
+	// Federation mode under which to
+	// run this test. This is important
+	// because it may effect which side
+	// effects are taken, if any.
+	instanceFederationMode string
+
+	// Series of actions to run as part
+	// of this test. After each action,
+	// expected will be called. This
+	// allows testers to run multiple
+	// actions in a row and check that
+	// the results after each action are
+	// what they expected, in light of
+	// previous actions.
+	actions []domainPermAction
+}
+
+// run a domainPermTest by running each of
+// its actions in turn and checking results.
+func (suite *DomainBlockTestSuite) runDomainPermTest(t domainPermTest) {
+	config.SetInstanceFederationMode(t.instanceFederationMode)
+
+	for _, action := range t.actions {
+		// Run the desired action.
+		var actionID string
+		switch action.createOrDelete {
+		case "create":
+			_, actionID = suite.createDomainPerm(action.permissionType, action.domain)
+		case "delete":
+			_, actionID = suite.deleteDomainPerm(action.permissionType, action.domain)
+		default:
+			panic("createOrDelete was not 'create' or 'delete'")
+		}
+
+		// Let the action finish.
+		suite.awaitAction(actionID)
+
+		// Check expected results
+		// against each account.
+		accounts, err := suite.db.GetInstanceAccounts(
+			context.Background(),
+			action.domain,
+			"", 0,
+		)
+		if err != nil {
+			suite.FailNow("", "error getting instance accounts for %s: %v", action.domain, err)
+		}
+
+		for _, account := range accounts {
+			if !action.expected(account) {
+				suite.T().FailNow()
+			}
+		}
+	}
+}
+
+// create given permissionType with default values.
+func (suite *DomainBlockTestSuite) createDomainPerm(
+	permissionType gtsmodel.DomainPermissionType,
+	domain string,
+) (*apimodel.DomainPermission, string) {
+	ctx := context.Background()
+
+	apiPerm, actionID, errWithCode := suite.adminProcessor.DomainPermissionCreate(
+		ctx,
+		permissionType,
+		suite.testAccounts["admin_account"],
+		domain,
+		false,
+		"",
+		"",
+		"",
+	)
+	suite.NoError(errWithCode)
+	suite.NotNil(apiPerm)
+	suite.NotEmpty(actionID)
+
+	return apiPerm, actionID
+}
+
+// delete given permission type.
+func (suite *DomainBlockTestSuite) deleteDomainPerm(
+	permissionType gtsmodel.DomainPermissionType,
+	domain string,
+) (*apimodel.DomainPermission, string) {
+	var (
+		ctx              = context.Background()
+		domainPermission gtsmodel.DomainPermission
+	)
+
+	// To delete the permission,
+	// first get it from the db.
+	switch permissionType {
+	case gtsmodel.DomainPermissionBlock:
+		domainPermission, _ = suite.db.GetDomainBlock(ctx, domain)
+	case gtsmodel.DomainPermissionAllow:
+		domainPermission, _ = suite.db.GetDomainAllow(ctx, domain)
+	default:
+		panic("unrecognized permission type")
+	}
+
+	if domainPermission == nil {
+		suite.FailNow("domain permission was nil")
+	}
+
+	// Now use the ID to delete it.
+	apiPerm, actionID, errWithCode := suite.adminProcessor.DomainPermissionDelete(
+		ctx,
+		permissionType,
+		suite.testAccounts["admin_account"],
+		domainPermission.GetID(),
+	)
+	suite.NoError(errWithCode)
+	suite.NotNil(apiPerm)
+	suite.NotEmpty(actionID)
+
+	return apiPerm, actionID
+}
+
+// waits for given actionID to be completed.
+func (suite *DomainBlockTestSuite) awaitAction(actionID string) {
+	ctx := context.Background()
+
+	if !testrig.WaitFor(func() bool {
+		return suite.adminProcessor.Actions().TotalRunning() == 0
+	}) {
+		suite.FailNow("timed out waiting for admin action(s) to finish")
+	}
+
+	// Ensure action marked as
+	// completed in the database.
+	adminAction, err := suite.db.GetAdminAction(ctx, actionID)
+	if err != nil {
+		suite.FailNow(err.Error())
+	}
+
+	suite.NotZero(adminAction.CompletedAt)
+	suite.Empty(adminAction.Errors)
+}
+
+func (suite *DomainBlockTestSuite) TestBlockAndUnblockDomain() {
+	const domain = "fossbros-anonymous.io"
+
+	suite.runDomainPermTest(domainPermTest{
+		instanceFederationMode: config.InstanceFederationModeBlocklist,
+		actions: []domainPermAction{
+			{
+				createOrDelete: "create",
+				permissionType: gtsmodel.DomainPermissionBlock,
+				domain:         domain,
+				expected: func(account *gtsmodel.Account) bool {
+					// Domain was blocked, so each
+					// account should now be suspended.
+					return suite.NotZero(account.SuspendedAt)
+				},
+			},
+			{
+				createOrDelete: "delete",
+				permissionType: gtsmodel.DomainPermissionBlock,
+				domain:         domain,
+				expected: func(account *gtsmodel.Account) bool {
+					// Domain was unblocked, so each
+					// account should now be unsuspended.
+					return suite.Zero(account.SuspendedAt)
+				},
+			},
+		},
+	})
+}
+
+func (suite *DomainBlockTestSuite) TestBlockAndAllowDomain() {
+	const domain = "fossbros-anonymous.io"
+
+	suite.runDomainPermTest(domainPermTest{
+		instanceFederationMode: config.InstanceFederationModeBlocklist,
+		actions: []domainPermAction{
+			{
+				createOrDelete: "create",
+				permissionType: gtsmodel.DomainPermissionBlock,
+				domain:         domain,
+				expected: func(account *gtsmodel.Account) bool {
+					// Domain was blocked, so each
+					// account should now be suspended.
+					return suite.NotZero(account.SuspendedAt)
+				},
+			},
+			{
+				createOrDelete: "create",
+				permissionType: gtsmodel.DomainPermissionAllow,
+				domain:         domain,
+				expected: func(account *gtsmodel.Account) bool {
+					// Domain was explicitly allowed, so each
+					// account should now be unsuspended, since
+					// the allow supercedes the block.
+					return suite.Zero(account.SuspendedAt)
+				},
+			},
+			{
+				createOrDelete: "delete",
+				permissionType: gtsmodel.DomainPermissionAllow,
+				domain:         domain,
+				expected: func(account *gtsmodel.Account) bool {
+					// Deleting the allow now, while there's
+					// still a block in place, should cause
+					// the block to take effect again.
+					return suite.NotZero(account.SuspendedAt)
+				},
+			},
+			{
+				createOrDelete: "delete",
+				permissionType: gtsmodel.DomainPermissionBlock,
+				domain:         domain,
+				expected: func(account *gtsmodel.Account) bool {
+					// Deleting the block now should
+					// unsuspend the accounts again.
+					return suite.Zero(account.SuspendedAt)
+				},
+			},
+		},
+	})
+}
+
+func TestDomainBlockTestSuite(t *testing.T) {
+	suite.Run(t, new(DomainBlockTestSuite))
+}
diff --git a/internal/processing/admin/util.go b/internal/processing/admin/util.go
index 403602901..c82ff2dc1 100644
--- a/internal/processing/admin/util.go
+++ b/internal/processing/admin/util.go
@@ -22,28 +22,11 @@ import (
 	"errors"
 	"time"
 
-	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 	"github.com/superseriousbusiness/gotosocial/internal/db"
 	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 )
 
-// apiDomainBlock is a cheeky shortcut for returning
-// the API version of the given domainBlock, or an
-// appropriate error if something goes wrong.
-func (p *Processor) apiDomainBlock(
-	ctx context.Context,
-	domainBlock *gtsmodel.DomainBlock,
-) (*apimodel.DomainBlock, gtserror.WithCode) {
-	apiDomainBlock, err := p.tc.DomainBlockToAPIDomainBlock(ctx, domainBlock, false)
-	if err != nil {
-		err = gtserror.Newf("error converting domain block for %s to api model : %w", domainBlock.Domain, err)
-		return nil, gtserror.NewErrorInternalError(err)
-	}
-
-	return apiDomainBlock, nil
-}
-
 // stubbifyInstance renders the given instance as a stub,
 // removing most information from it and marking it as
 // suspended.
diff --git a/internal/typeutils/converter.go b/internal/typeutils/converter.go
index 774b68157..af77734cc 100644
--- a/internal/typeutils/converter.go
+++ b/internal/typeutils/converter.go
@@ -91,8 +91,8 @@ type TypeConverter interface {
 	RelationshipToAPIRelationship(ctx context.Context, r *gtsmodel.Relationship) (*apimodel.Relationship, error)
 	// NotificationToAPINotification converts a gts notification into a api notification
 	NotificationToAPINotification(ctx context.Context, n *gtsmodel.Notification) (*apimodel.Notification, error)
-	// DomainBlockToAPIDomainBlock converts a gts model domin block into a api domain block, for serving at /api/v1/admin/domain_blocks
-	DomainBlockToAPIDomainBlock(ctx context.Context, b *gtsmodel.DomainBlock, export bool) (*apimodel.DomainBlock, error)
+	// DomainPermToAPIDomainPerm converts a gts model domin block or allow into an api domain permission.
+	DomainPermToAPIDomainPerm(ctx context.Context, d gtsmodel.DomainPermission, export bool) (*apimodel.DomainPermission, error)
 	// ReportToAPIReport converts a gts model report into an api model report, for serving at /api/v1/reports
 	ReportToAPIReport(ctx context.Context, r *gtsmodel.Report) (*apimodel.Report, error)
 	// ReportToAdminAPIReport converts a gts model report into an admin view report, for serving at /api/v1/admin/reports
diff --git a/internal/typeutils/internaltofrontend.go b/internal/typeutils/internaltofrontend.go
index 050997bda..11838e2bd 100644
--- a/internal/typeutils/internaltofrontend.go
+++ b/internal/typeutils/internaltofrontend.go
@@ -1041,32 +1041,39 @@ func (c *converter) NotificationToAPINotification(ctx context.Context, n *gtsmod
 	}, nil
 }
 
-func (c *converter) DomainBlockToAPIDomainBlock(ctx context.Context, b *gtsmodel.DomainBlock, export bool) (*apimodel.DomainBlock, error) {
+func (c *converter) DomainPermToAPIDomainPerm(
+	ctx context.Context,
+	d gtsmodel.DomainPermission,
+	export bool,
+) (*apimodel.DomainPermission, error) {
 	// Domain may be in Punycode,
 	// de-punify it just in case.
-	d, err := util.DePunify(b.Domain)
+	domain, err := util.DePunify(d.GetDomain())
 	if err != nil {
-		return nil, fmt.Errorf("DomainBlockToAPIDomainBlock: error de-punifying domain %s: %w", b.Domain, err)
+		return nil, gtserror.Newf("error de-punifying domain %s: %w", d.GetDomain(), err)
 	}
 
-	domainBlock := &apimodel.DomainBlock{
+	domainPerm := &apimodel.DomainPermission{
 		Domain: apimodel.Domain{
-			Domain:        d,
-			PublicComment: b.PublicComment,
+			Domain:        domain,
+			PublicComment: d.GetPublicComment(),
 		},
 	}
 
-	// if we're exporting a domain block, return it with minimal information attached
-	if !export {
-		domainBlock.ID = b.ID
-		domainBlock.Obfuscate = *b.Obfuscate
-		domainBlock.PrivateComment = b.PrivateComment
-		domainBlock.SubscriptionID = b.SubscriptionID
-		domainBlock.CreatedBy = b.CreatedByAccountID
-		domainBlock.CreatedAt = util.FormatISO8601(b.CreatedAt)
+	// If we're exporting, provide
+	// only bare minimum detail.
+	if export {
+		return domainPerm, nil
 	}
 
-	return domainBlock, nil
+	domainPerm.ID = d.GetID()
+	domainPerm.Obfuscate = *d.GetObfuscate()
+	domainPerm.PrivateComment = d.GetPrivateComment()
+	domainPerm.SubscriptionID = d.GetSubscriptionID()
+	domainPerm.CreatedBy = d.GetCreatedByAccountID()
+	domainPerm.CreatedAt = util.FormatISO8601(d.GetCreatedAt())
+
+	return domainPerm, nil
 }
 
 func (c *converter) ReportToAPIReport(ctx context.Context, r *gtsmodel.Report) (*apimodel.Report, error) {
diff --git a/mkdocs.yml b/mkdocs.yml
index bcfc9f754..189f01a7f 100644
--- a/mkdocs.yml
+++ b/mkdocs.yml
@@ -102,6 +102,8 @@ nav:
 
   - "Admin":
       - "admin/settings.md"
+      - "admin/federation_modes.md"
+      - "admin/domain_blocks.md"
       - "admin/cli.md"
       - "admin/backup_and_restore.md"
   - "Federation":
diff --git a/test/envparsing.sh b/test/envparsing.sh
index 68e250db0..684d008a9 100755
--- a/test/envparsing.sh
+++ b/test/envparsing.sh
@@ -81,6 +81,7 @@ EXPECT=$(cat << "EOF"
     "instance-expose-public-timeline": true,
     "instance-expose-suspended": true,
     "instance-expose-suspended-web": true,
+    "instance-federation-mode": "allowlist",
     "instance-inject-mastodon-version": true,
     "landing-page-user": "admin",
     "letsencrypt-cert-dir": "/gotosocial/storage/certs",
@@ -192,6 +193,7 @@ GTS_INSTANCE_EXPOSE_PEERS=true \
 GTS_INSTANCE_EXPOSE_SUSPENDED=true \
 GTS_INSTANCE_EXPOSE_SUSPENDED_WEB=true \
 GTS_INSTANCE_EXPOSE_PUBLIC_TIMELINE=true \
+GTS_INSTANCE_FEDERATION_MODE='allowlist' \
 GTS_INSTANCE_DELIVER_TO_SHARED_INBOXES=false \
 GTS_INSTANCE_INJECT_MASTODON_VERSION=true \
 GTS_ACCOUNTS_ALLOW_CUSTOM_CSS=true \
diff --git a/testrig/config.go b/testrig/config.go
index a85a88477..154e61f47 100644
--- a/testrig/config.go
+++ b/testrig/config.go
@@ -63,6 +63,7 @@ var testDefaults = config.Configuration{
 	WebTemplateBaseDir: "./web/template/",
 	WebAssetBaseDir:    "./web/assets/",
 
+	InstanceFederationMode:         config.InstanceFederationModeDefault,
 	InstanceExposePeers:            true,
 	InstanceExposeSuspended:        true,
 	InstanceExposeSuspendedWeb:     true,