2023-03-12 16:00:57 +01:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2021-08-20 12:26:56 +02:00
|
|
|
|
2021-08-25 15:34:33 +02:00
|
|
|
package bundb
|
2021-08-20 12:26:56 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net/url"
|
|
|
|
|
2022-05-23 11:46:50 +02:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/config"
|
2021-08-20 12:26:56 +02:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
2022-12-08 18:35:14 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/state"
|
2023-05-07 19:53:21 +02:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/util"
|
2022-10-08 13:50:48 +02:00
|
|
|
"github.com/uptrace/bun"
|
2021-08-20 12:26:56 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
type domainDB struct {
|
2023-08-17 18:26:21 +02:00
|
|
|
db *DB
|
2022-12-08 18:35:14 +01:00
|
|
|
state *state.State
|
2021-08-20 12:26:56 +02:00
|
|
|
}
|
|
|
|
|
2023-07-25 10:34:05 +02:00
|
|
|
func (d *domainDB) CreateDomainBlock(ctx context.Context, block *gtsmodel.DomainBlock) error {
|
2022-12-14 10:55:36 +01:00
|
|
|
// Normalize the domain as punycode
|
2023-05-07 19:53:21 +02:00
|
|
|
var err error
|
|
|
|
block.Domain, err = util.Punify(block.Domain)
|
2022-10-01 17:48:38 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-09-02 12:17:46 +02:00
|
|
|
|
2023-07-07 11:34:12 +02:00
|
|
|
// Attempt to store domain block in DB
|
2023-07-25 10:34:05 +02:00
|
|
|
if _, err := d.db.NewInsert().
|
2022-12-14 10:55:36 +01:00
|
|
|
Model(block).
|
|
|
|
Exec(ctx); err != nil {
|
2023-08-17 18:26:21 +02:00
|
|
|
return err
|
2022-12-14 10:55:36 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Clear the domain block cache (for later reload)
|
|
|
|
d.state.Caches.GTS.DomainBlock().Clear()
|
|
|
|
|
|
|
|
return nil
|
2022-09-02 12:17:46 +02:00
|
|
|
}
|
|
|
|
|
2023-07-25 10:34:05 +02:00
|
|
|
func (d *domainDB) GetDomainBlock(ctx context.Context, domain string) (*gtsmodel.DomainBlock, error) {
|
2022-12-14 10:55:36 +01:00
|
|
|
// Normalize the domain as punycode
|
2023-05-07 19:53:21 +02:00
|
|
|
domain, err := util.Punify(domain)
|
2022-10-01 17:48:38 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-09-02 12:17:46 +02:00
|
|
|
|
2022-12-14 10:55:36 +01:00
|
|
|
// Check for easy case, domain referencing *us*
|
|
|
|
if domain == "" || domain == config.GetAccountDomain() ||
|
|
|
|
domain == config.GetHost() {
|
|
|
|
return nil, db.ErrNoEntries
|
|
|
|
}
|
2022-09-02 12:17:46 +02:00
|
|
|
|
2022-12-14 10:55:36 +01:00
|
|
|
var block gtsmodel.DomainBlock
|
2022-09-02 12:17:46 +02:00
|
|
|
|
2022-12-14 10:55:36 +01:00
|
|
|
// Look for block matching domain in DB
|
2023-07-25 10:34:05 +02:00
|
|
|
q := d.db.
|
2022-12-14 10:55:36 +01:00
|
|
|
NewSelect().
|
|
|
|
Model(&block).
|
|
|
|
Where("? = ?", bun.Ident("domain_block.domain"), domain)
|
|
|
|
if err := q.Scan(ctx); err != nil {
|
2023-08-17 18:26:21 +02:00
|
|
|
return nil, err
|
2022-12-14 10:55:36 +01:00
|
|
|
}
|
2022-09-02 12:17:46 +02:00
|
|
|
|
2022-12-14 10:55:36 +01:00
|
|
|
return &block, nil
|
2021-08-20 12:26:56 +02:00
|
|
|
}
|
|
|
|
|
2023-07-07 11:34:12 +02:00
|
|
|
func (d *domainDB) GetDomainBlocks(ctx context.Context) ([]*gtsmodel.DomainBlock, error) {
|
|
|
|
blocks := []*gtsmodel.DomainBlock{}
|
|
|
|
|
2023-07-25 10:34:05 +02:00
|
|
|
if err := d.db.
|
2023-07-07 11:34:12 +02:00
|
|
|
NewSelect().
|
|
|
|
Model(&blocks).
|
|
|
|
Scan(ctx); err != nil {
|
2023-08-17 18:26:21 +02:00
|
|
|
return nil, err
|
2023-07-07 11:34:12 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return blocks, nil
|
|
|
|
}
|
|
|
|
|
2023-07-25 10:34:05 +02:00
|
|
|
func (d *domainDB) GetDomainBlockByID(ctx context.Context, id string) (*gtsmodel.DomainBlock, error) {
|
2023-07-07 11:34:12 +02:00
|
|
|
var block gtsmodel.DomainBlock
|
|
|
|
|
2023-07-25 10:34:05 +02:00
|
|
|
q := d.db.
|
2023-07-07 11:34:12 +02:00
|
|
|
NewSelect().
|
|
|
|
Model(&block).
|
|
|
|
Where("? = ?", bun.Ident("domain_block.id"), id)
|
|
|
|
if err := q.Scan(ctx); err != nil {
|
2023-08-17 18:26:21 +02:00
|
|
|
return nil, err
|
2023-07-07 11:34:12 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return &block, nil
|
|
|
|
}
|
|
|
|
|
2023-07-25 10:34:05 +02:00
|
|
|
func (d *domainDB) DeleteDomainBlock(ctx context.Context, domain string) error {
|
2023-05-07 19:53:21 +02:00
|
|
|
// Normalize the domain as punycode
|
|
|
|
domain, err := util.Punify(domain)
|
2022-10-01 17:48:38 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-08-20 12:26:56 +02:00
|
|
|
|
2022-09-02 12:17:46 +02:00
|
|
|
// Attempt to delete domain block
|
2023-07-25 10:34:05 +02:00
|
|
|
if _, err := d.db.NewDelete().
|
2022-09-02 12:17:46 +02:00
|
|
|
Model((*gtsmodel.DomainBlock)(nil)).
|
2022-10-08 13:50:48 +02:00
|
|
|
Where("? = ?", bun.Ident("domain_block.domain"), domain).
|
2022-10-01 17:48:38 +02:00
|
|
|
Exec(ctx); err != nil {
|
2023-08-17 18:26:21 +02:00
|
|
|
return err
|
2022-09-02 12:17:46 +02:00
|
|
|
}
|
|
|
|
|
2022-12-14 10:55:36 +01:00
|
|
|
// Clear the domain block cache (for later reload)
|
|
|
|
d.state.Caches.GTS.DomainBlock().Clear()
|
2022-09-02 12:17:46 +02:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-07-25 10:34:05 +02:00
|
|
|
func (d *domainDB) IsDomainBlocked(ctx context.Context, domain string) (bool, error) {
|
2022-12-14 10:55:36 +01:00
|
|
|
// Normalize the domain as punycode
|
2023-05-07 19:53:21 +02:00
|
|
|
domain, err := util.Punify(domain)
|
2022-12-14 10:55:36 +01:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
2022-09-02 12:17:46 +02:00
|
|
|
}
|
2022-12-14 10:55:36 +01:00
|
|
|
|
|
|
|
// Check for easy case, domain referencing *us*
|
|
|
|
if domain == "" || domain == config.GetAccountDomain() ||
|
|
|
|
domain == config.GetHost() {
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the cache for a domain block (hydrating the cache with callback if necessary)
|
|
|
|
return d.state.Caches.GTS.DomainBlock().IsBlocked(domain, func() ([]string, error) {
|
|
|
|
var domains []string
|
|
|
|
|
|
|
|
// Scan list of all blocked domains from DB
|
2023-07-25 10:34:05 +02:00
|
|
|
q := d.db.NewSelect().
|
2022-12-14 10:55:36 +01:00
|
|
|
Table("domain_blocks").
|
|
|
|
Column("domain")
|
|
|
|
if err := q.Scan(ctx, &domains); err != nil {
|
2023-08-17 18:26:21 +02:00
|
|
|
return nil, err
|
2022-12-14 10:55:36 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return domains, nil
|
|
|
|
})
|
2022-09-02 12:17:46 +02:00
|
|
|
}
|
|
|
|
|
2023-07-25 10:34:05 +02:00
|
|
|
func (d *domainDB) AreDomainsBlocked(ctx context.Context, domains []string) (bool, error) {
|
2022-09-02 12:17:46 +02:00
|
|
|
for _, domain := range domains {
|
|
|
|
if blocked, err := d.IsDomainBlocked(ctx, domain); err != nil {
|
2021-08-20 12:26:56 +02:00
|
|
|
return false, err
|
|
|
|
} else if blocked {
|
|
|
|
return blocked, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
2023-07-25 10:34:05 +02:00
|
|
|
func (d *domainDB) IsURIBlocked(ctx context.Context, uri *url.URL) (bool, error) {
|
2022-09-02 12:17:46 +02:00
|
|
|
return d.IsDomainBlocked(ctx, uri.Hostname())
|
2021-08-20 12:26:56 +02:00
|
|
|
}
|
|
|
|
|
2023-07-25 10:34:05 +02:00
|
|
|
func (d *domainDB) AreURIsBlocked(ctx context.Context, uris []*url.URL) (bool, error) {
|
2021-08-20 12:26:56 +02:00
|
|
|
for _, uri := range uris {
|
2022-09-02 12:17:46 +02:00
|
|
|
if blocked, err := d.IsDomainBlocked(ctx, uri.Hostname()); err != nil {
|
|
|
|
return false, err
|
|
|
|
} else if blocked {
|
|
|
|
return blocked, nil
|
|
|
|
}
|
2021-08-20 12:26:56 +02:00
|
|
|
}
|
2022-09-02 12:17:46 +02:00
|
|
|
return false, nil
|
2021-08-20 12:26:56 +02:00
|
|
|
}
|