def destroy
authorize @domain_block, :destroy?
- UnblockDomainService.new.call(@domain_block, retroactive_unblock?)
+ UnblockDomainService.new.call(@domain_block)
log_action :destroy, @domain_block
redirect_to admin_instances_path(limited: '1'), notice: I18n.t('admin.domain_blocks.destroyed_msg')
end
end
def resource_params
- params.require(:domain_block).permit(:domain, :severity, :reject_media, :reject_reports, :retroactive)
- end
-
- def retroactive_unblock?
- ActiveRecord::Type.lookup(:boolean).cast(resource_params[:retroactive])
+ params.require(:domain_block).permit(:domain, :severity, :reject_media, :reject_reports)
end
end
end
if request.path.start_with?('/web')
new_user_session_path
elsif single_user_mode?
- short_account_path(Account.local.where(suspended: false).first)
+ short_account_path(Account.local.without_suspended.first)
else
about_path
end
# header_updated_at :datetime
# avatar_remote_url :string
# subscription_expires_at :datetime
-# silenced :boolean default(FALSE), not null
-# suspended :boolean default(FALSE), not null
# locked :boolean default(FALSE), not null
# header_remote_url :string default(""), not null
# last_webfingered_at :datetime
# actor_type :string
# discoverable :boolean
# also_known_as :string is an Array
+# silenced_at :datetime
+# suspended_at :datetime
#
class Account < ApplicationRecord
scope :local, -> { where(domain: nil) }
scope :expiring, ->(time) { remote.where.not(subscription_expires_at: nil).where('subscription_expires_at < ?', time) }
scope :partitioned, -> { order(Arel.sql('row_number() over (partition by domain)')) }
- scope :silenced, -> { where(silenced: true) }
- scope :suspended, -> { where(suspended: true) }
- scope :without_suspended, -> { where(suspended: false) }
- scope :without_silenced, -> { where(silenced: false) }
+ scope :silenced, -> { where.not(silenced_at: nil) }
+ scope :suspended, -> { where.not(suspended_at: nil) }
+ scope :without_suspended, -> { where(suspended_at: nil) }
+ scope :without_silenced, -> { where(silenced_at: nil) }
scope :recent, -> { reorder(id: :desc) }
scope :bots, -> { where(actor_type: %w(Application Service)) }
scope :alphabetic, -> { order(domain: :asc, username: :asc) }
ResolveAccountService.new.call(acct)
end
- def silence!
- update!(silenced: true)
+ def silenced?
+ silenced_at.present?
+ end
+
+ def silence!(date = nil)
+ date ||= Time.now.utc
+ update!(silenced_at: date)
end
def unsilence!
- update!(silenced: false)
+ update!(silenced_at: nil)
+ end
+
+ def suspended?
+ suspended_at.present?
end
- def suspend!
+ def suspend!(date = nil)
+ date ||= Time.now.utc
transaction do
user&.disable! if local?
- update!(suspended: true)
+ update!(suspended_at: date)
end
end
def unsuspend!
transaction do
user&.enable! if local?
- update!(suspended: false)
+ update!(suspended_at: nil)
end
end
ts_rank_cd(#{textsearch}, #{query}, 32) AS rank
FROM accounts
WHERE #{query} @@ #{textsearch}
- AND accounts.suspended = false
+ AND accounts.suspended_at IS NULL
AND accounts.moved_to_account_id IS NULL
ORDER BY rank DESC
LIMIT ? OFFSET ?
LEFT OUTER JOIN follows AS f ON (accounts.id = f.account_id AND f.target_account_id = ?) OR (accounts.id = f.target_account_id AND f.account_id = ?)
WHERE accounts.id IN (SELECT * FROM first_degree)
AND #{query} @@ #{textsearch}
- AND accounts.suspended = false
+ AND accounts.suspended_at IS NULL
AND accounts.moved_to_account_id IS NULL
GROUP BY accounts.id
ORDER BY rank DESC
FROM accounts
LEFT OUTER JOIN follows AS f ON (accounts.id = f.account_id AND f.target_account_id = ?) OR (accounts.id = f.target_account_id AND f.account_id = ?)
WHERE #{query} @@ #{textsearch}
- AND accounts.suspended = false
+ AND accounts.suspended_at IS NULL
AND accounts.moved_to_account_id IS NULL
GROUP BY accounts.id
ORDER BY rank DESC
end
def representative
- find_local(Setting.site_contact_username.strip.gsub(/\A@/, '')) || Account.local.find_by(suspended: false)
+ find_local(Setting.site_contact_username.strip.gsub(/\A@/, '')) || Account.local.without_suspended.first
end
def find_local(username)
enum severity: [:silence, :suspend, :noop]
- attr_accessor :retroactive
-
validates :domain, presence: true, uniqueness: true
has_many :accounts, foreign_key: :domain, primary_key: :domain
return false if other_block.silence? && noop?
(reject_media || !other_block.reject_media) && (reject_reports || !other_block.reject_reports)
end
+
+ def affected_accounts_count
+ scope = suspend? ? accounts.where(suspended_at: created_at) : accounts.where(silenced_at: created_at)
+ scope.count
+ end
end
scope :without_reblogs, -> { where('statuses.reblog_of_id IS NULL') }
scope :with_public_visibility, -> { where(visibility: :public) }
scope :tagged_with, ->(tag) { joins(:statuses_tags).where(statuses_tags: { tag_id: tag }) }
- scope :excluding_silenced_accounts, -> { left_outer_joins(:account).where(accounts: { silenced: false }) }
- scope :including_silenced_accounts, -> { left_outer_joins(:account).where(accounts: { silenced: true }) }
+ scope :excluding_silenced_accounts, -> { left_outer_joins(:account).where(accounts: { silenced_at: nil }) }
+ scope :including_silenced_accounts, -> { left_outer_joins(:account).where.not(accounts: { silenced_at: nil }) }
scope :not_excluded_by_account, ->(account) { where.not(account_id: account.excluded_from_timeline_account_ids) }
scope :not_domain_blocked_by_account, ->(account) { account.excluded_from_timeline_domains.blank? ? left_outer_joins(:account) : left_outer_joins(:account).where('accounts.domain IS NULL OR accounts.domain NOT IN (?)', account.excluded_from_timeline_domains) }
scope :tagged_with_all, ->(tags) {
scope :confirmed, -> { where.not(confirmed_at: nil) }
scope :enabled, -> { where(disabled: false) }
scope :inactive, -> { where(arel_table[:current_sign_in_at].lt(ACTIVE_DURATION.ago)) }
- scope :active, -> { confirmed.where(arel_table[:current_sign_in_at].gteq(ACTIVE_DURATION.ago)).joins(:account).where(accounts: { suspended: false }) }
+ scope :active, -> { confirmed.where(arel_table[:current_sign_in_at].gteq(ACTIVE_DURATION.ago)).joins(:account).where.not(accounts: { suspended_at: nil }) }
scope :matches_email, ->(value) { where(arel_table[:email].matches("#{value}%")) }
scope :emailable, -> { confirmed.enabled.joins(:account).merge(Account.searchable) }
def create_account
@account = Account.new
- @account.protocol = :activitypub
- @account.username = @username
- @account.domain = @domain
- @account.suspended = true if auto_suspend?
- @account.silenced = true if auto_silence?
- @account.private_key = nil
+ @account.protocol = :activitypub
+ @account.username = @username
+ @account.domain = @domain
+ @account.private_key = nil
+ @account.suspended_at = domain_block.created_at if auto_suspend?
+ @account.silenced_at = domain_block.created_at if auto_silence?
end
def update_account
end
def silence_accounts!
- blocked_domain_accounts.in_batches.update_all(silenced: true)
+ blocked_domain_accounts.without_silenced.in_batches.update_all(silenced_at: @domain_block.created_at)
end
def clear_media!
end
def suspend_accounts!
- blocked_domain_accounts.where(suspended: false).reorder(nil).find_each do |account|
+ blocked_domain_accounts.without_suspended.reorder(nil).find_each do |account|
UnsubscribeService.new.call(account) if account.subscribed?
- SuspendAccountService.new.call(account)
+ SuspendAccountService.new.call(account, suspended_at: @domain_block.created_at)
end
end
def preprocess_attributes!
@text = @options.delete(:spoiler_text) if @text.blank? && @options[:spoiler_text].present?
@visibility = @options[:visibility] || @account.user&.setting_default_privacy
- @visibility = :unlisted if @visibility == :public && @account.silenced
+ @visibility = :unlisted if @visibility == :public && @account.silenced?
@scheduled_at = @options[:scheduled_at]&.to_datetime
@scheduled_at = nil if scheduled_in_the_past?
rescue ArgumentError
end
end
- next match if mention_undeliverable?(mentioned_account) || mentioned_account&.suspended
+ next match if mention_undeliverable?(mentioned_account) || mentioned_account&.suspended?
mentions << mentioned_account.mentions.where(status: status).first_or_create(status: status)
Rails.logger.debug "Creating new remote account for #{@username}@#{@domain}"
@account = Account.new(username: @username, domain: @domain)
- @account.suspended = true if auto_suspend?
- @account.silenced = true if auto_silence?
- @account.private_key = nil
+ @account.suspended_at = domain_block.created_at if auto_suspend?
+ @account.silenced_at = domain_block.created_at if auto_silence?
+ @account.private_key = nil
end
def update_account
end
def some_local_account
- @some_local_account ||= Account.local.where(suspended: false).first
+ @some_local_account ||= Account.local.without_suspended.first
end
# Any response in the 3xx or 4xx range, except for 429 (rate limit)
return if @options[:destroy]
- @account.silenced = false
- @account.suspended = true
+ @account.silenced_at = nil
+ @account.suspended_at = @options[:suspended_at] || Time.now.utc
@account.locked = false
@account.display_name = ''
@account.note = ''
class UnblockDomainService < BaseService
attr_accessor :domain_block
- def call(domain_block, retroactive)
+ def call(domain_block)
@domain_block = domain_block
- process_retroactive_updates if retroactive
+ process_retroactive_updates
domain_block.destroy
end
end
def blocked_accounts
- Account.where(domain: domain_block.domain)
+ scope = Account.where(domain: domain_block.domain)
+ if domain_block.silence?
+ scope.where(silenced_at: @domain_block.created_at)
+ else
+ scope.where(suspended_at: @domain_block.created_at)
+ end
end
def update_options
- { domain_block_impact => false }
+ { domain_block_impact => nil }
end
def domain_block_impact
- domain_block.silence? ? :silenced : :suspended
+ domain_block.silence? ? :silenced_at : :suspended_at
end
end
= simple_form_for @domain_block, url: admin_domain_block_path(@domain_block), method: :delete do |f|
- - if (@domain_block.noop?)
- = f.input :retroactive,
- as: :hidden,
- input_html: { :value => "0" }
- - else
- = f.input :retroactive,
- as: :boolean,
- wrapper: :with_label,
- label: t(".retroactive.#{@domain_block.severity}"),
- hint: t(:affected_accounts,
- scope: [:admin, :domain_blocks, :show],
- count: @domain_block.accounts_count)
+ - unless (@domain_block.noop?)
+ %p= t(".retroactive.#{@domain_block.severity}")
+ %p.hint= t(:affected_accounts,
+ scope: [:admin, :domain_blocks, :show],
+ count: @domain_block.affected_accounts_count)
.actions
= f.button :button, t('.undo'), type: :submit
one: One account in the database affected
other: "%{count} accounts in the database affected"
retroactive:
- silence: Unsilence all existing accounts from this domain
- suspend: Unsuspend all existing accounts from this domain
+ silence: Unsilence existing affected accounts from this domain
+ suspend: Unsuspend existing affected accounts from this domain
title: Undo domain block for %{domain}
undo: Undo
undo: Undo domain block
--- /dev/null
+class AddSilencedAtSuspendedAtToAccounts < ActiveRecord::Migration[5.2]
+ class Account < ApplicationRecord
+ # Dummy class, to make migration possible across version changes
+ end
+
+ class DomainBlock < ApplicationRecord
+ # Dummy class, to make migration possible across version changes
+ enum severity: [:silence, :suspend, :noop]
+
+ has_many :accounts, foreign_key: :domain, primary_key: :domain
+ end
+
+ def up
+ add_column :accounts, :silenced_at, :datetime
+ add_column :accounts, :suspended_at, :datetime
+
+ # Record suspend date of blocks and silences for users whose limitations match
+ # a domain block
+ DomainBlock.where(severity: [:silence, :suspend]).find_each do |block|
+ scope = block.accounts
+ if block.suspend?
+ block.accounts.where(suspended: true).in_batches.update_all(suspended_at: block.created_at)
+ else
+ block.accounts.where(silenced: true).in_batches.update_all(silenced_at: block.created_at)
+ end
+ end
+
+ # Set dates for accounts which have limitations not related to a domain block
+ Account.where(suspended: true, suspended_at: nil).in_batches.update_all(suspended_at: Time.now.utc)
+ Account.where(silenced: true, silenced_at: nil).in_batches.update_all(silenced_at: Time.now.utc)
+ end
+
+ def down
+ # Block or silence accounts that have a date set
+ Account.where(suspended: false).where.not(suspended_at: nil).in_batches.update_all(suspended: true)
+ Account.where(silenced: false).where.not(silenced_at: nil).in_batches.update_all(silenced: true)
+
+ remove_column :accounts, :silenced_at
+ remove_column :accounts, :suspended_at
+ end
+end
--- /dev/null
+# frozen_string_literal: true
+
+class RemoveSuspendedSilencedAccountFields < ActiveRecord::Migration[5.2]
+ class Account < ApplicationRecord
+ # Dummy class, to make migration possible across version changes
+ end
+
+ class DomainBlock < ApplicationRecord
+ # Dummy class, to make migration possible across version changes
+ enum severity: [:silence, :suspend, :noop]
+
+ has_many :accounts, foreign_key: :domain, primary_key: :domain
+ end
+
+ disable_ddl_transaction!
+
+ def up
+ # Record suspend date of blocks and silences for users whose limitations match
+ # a domain block
+ DomainBlock.where(severity: [:silence, :suspend]).find_each do |block|
+ scope = block.accounts
+ if block.suspend?
+ block.accounts.where(suspended: true).in_batches.update_all(suspended_at: block.created_at)
+ else
+ block.accounts.where(silenced: true).in_batches.update_all(silenced_at: block.created_at)
+ end
+ end
+
+ # Set dates for accounts which have limitations not related to a domain block
+ Account.where(suspended: true, suspended_at: nil).in_batches.update_all(suspended_at: Time.now.utc)
+ Account.where(silenced: true, silenced_at: nil).in_batches.update_all(silenced_at: Time.now.utc)
+
+ safety_assured do
+ remove_column :accounts, :suspended, :boolean, null: false, default: false
+ remove_column :accounts, :silenced, :boolean, null: false, default: false
+ end
+ end
+
+ def down
+ safety_assured do
+ add_column :accounts, :suspended, :boolean, null: false, default: false
+ add_column :accounts, :silenced, :boolean, null: false, default: false
+ end
+ end
+end
#
# It's strongly recommended that you check this file into your version control system.
-ActiveRecord::Schema.define(version: 2019_05_09_164208) do
+ActiveRecord::Schema.define(version: 2019_05_11_152737) do
# These are extensions that must be enabled in order to support this database
enable_extension "plpgsql"
t.datetime "header_updated_at"
t.string "avatar_remote_url"
t.datetime "subscription_expires_at"
- t.boolean "silenced", default: false, null: false
- t.boolean "suspended", default: false, null: false
t.boolean "locked", default: false, null: false
t.string "header_remote_url", default: "", null: false
t.datetime "last_webfingered_at"
t.string "actor_type"
t.boolean "discoverable"
t.string "also_known_as", array: true
+ t.datetime "silenced_at"
+ t.datetime "suspended_at"
t.index "(((setweight(to_tsvector('simple'::regconfig, (display_name)::text), 'A'::\"char\") || setweight(to_tsvector('simple'::regconfig, (username)::text), 'B'::\"char\")) || setweight(to_tsvector('simple'::regconfig, (COALESCE(domain, ''::character varying))::text), 'C'::\"char\")))", name: "search_index", using: :gin
t.index "lower((username)::text), lower((domain)::text)", name: "index_accounts_on_username_and_domain_lower", unique: true
t.index ["moved_to_account_id"], name: "index_accounts_on_moved_to_account_id"
[json, account.id, inbox_url]
end
- account.update_column(:suspended, true)
+ account.suspend!
end
processed += 1
end
end
- account.suspended = false
- user.account = account
+ account.suspended_at = nil
+ user.account = account
if user.save
if options[:confirmed]
service = double(call: true)
allow(UnblockDomainService).to receive(:new).and_return(service)
domain_block = Fabricate(:domain_block)
- delete :destroy, params: { id: domain_block.id, domain_block: { retroactive: '1' } }
+ delete :destroy, params: { id: domain_block.id }
- expect(service).to have_received(:call).with(domain_block, true)
+ expect(service).to have_received(:call).with(domain_block)
expect(flash[:notice]).to eq I18n.t('admin.domain_blocks.destroyed_msg')
expect(response).to redirect_to(admin_instances_path(limited: '1'))
end
private_key = keypair.to_pem
Fabricator(:account) do
+ transient :suspended, :silenced
username { sequence(:username) { |i| "#{Faker::Internet.user_name(nil, %w(_))}#{i}" } }
last_webfingered_at { Time.now.utc }
public_key { public_key }
private_key { private_key }
+ suspended_at { |attrs| attrs[:suspended] ? Time.now.utc : nil }
+ silenced_at { |attrs| attrs[:silenced] ? Time.now.utc : nil }
end
it 'returns true for status by silenced account who recipient is not following' do
status = Fabricate(:status, text: 'Hello world', account: alice)
- alice.update(silenced: true)
+ alice.silence!
expect(FeedManager.instance.filter?(:mentions, status, bob.id)).to be true
end
it 'returns false for status by followed silenced account' do
status = Fabricate(:status, text: 'Hello world', account: alice)
- alice.update(silenced: true)
+ alice.silence!
bob.follow!(alice)
expect(FeedManager.instance.filter?(:mentions, status, bob.id)).to be false
end
context 'when status account is silenced' do
before do
- status.account.update(silenced: true)
+ status.account.silence!
end
it { is_expected.to be_filtered }
context 'when status account is silenced' do
before do
- status.account.update(silenced: true)
+ status.account.silence!
end
it { is_expected.to be_filtered }
end
it 'does not return conversation history from silenced and not followed users' do
- jeff.update(silenced: true)
+ jeff.silence!
expect(reply3.ancestors(4, viewer)).to_not include(reply1)
end
end
it 'does not return replies from silenced and not followed users' do
- jeff.update(silenced: true)
+ jeff.silence!
expect(status.descendants(4, viewer)).to_not include(reply3)
end
require 'rails_helper'
RSpec.describe BlockDomainService, type: :service do
- let(:bad_account) { Fabricate(:account, username: 'badguy666', domain: 'evil.org') }
- let(:bad_status1) { Fabricate(:status, account: bad_account, text: 'You suck') }
- let(:bad_status2) { Fabricate(:status, account: bad_account, text: 'Hahaha') }
- let(:bad_attachment) { Fabricate(:media_attachment, account: bad_account, status: bad_status2, file: attachment_fixture('attachment.jpg')) }
+ let!(:bad_account) { Fabricate(:account, username: 'badguy666', domain: 'evil.org') }
+ let!(:bad_status1) { Fabricate(:status, account: bad_account, text: 'You suck') }
+ let!(:bad_status2) { Fabricate(:status, account: bad_account, text: 'Hahaha') }
+ let!(:bad_attachment) { Fabricate(:media_attachment, account: bad_account, status: bad_status2, file: attachment_fixture('attachment.jpg')) }
+ let!(:already_banned_account) { Fabricate(:account, username: 'badguy', domain: 'evil.org', suspended: true, silenced: true) }
subject { BlockDomainService.new }
- before do
- bad_account
- bad_status1
- bad_status2
- bad_attachment
- end
-
describe 'for a suspension' do
before do
subject.call(DomainBlock.create!(domain: 'evil.org', severity: :suspend))
expect(Account.find_remote('badguy666', 'evil.org').suspended?).to be true
end
+ it 'records suspension date appropriately' do
+ expect(Account.find_remote('badguy666', 'evil.org').suspended_at).to eq DomainBlock.find_by(domain: 'evil.org').created_at
+ end
+
+ it 'keeps already-banned accounts banned' do
+ expect(Account.find_remote('badguy', 'evil.org').suspended?).to be true
+ end
+
+ it 'does not overwrite suspension date of already-banned accounts' do
+ expect(Account.find_remote('badguy', 'evil.org').suspended_at).to_not eq DomainBlock.find_by(domain: 'evil.org').created_at
+ end
+
it 'removes the remote accounts\'s statuses and media attachments' do
expect { bad_status1.reload }.to raise_exception ActiveRecord::RecordNotFound
expect { bad_status2.reload }.to raise_exception ActiveRecord::RecordNotFound
expect(Account.find_remote('badguy666', 'evil.org').silenced?).to be true
end
+ it 'records suspension date appropriately' do
+ expect(Account.find_remote('badguy666', 'evil.org').silenced_at).to eq DomainBlock.find_by(domain: 'evil.org').created_at
+ end
+
+ it 'keeps already-banned accounts banned' do
+ expect(Account.find_remote('badguy', 'evil.org').silenced?).to be true
+ end
+
+ it 'does not overwrite suspension date of already-banned accounts' do
+ expect(Account.find_remote('badguy', 'evil.org').silenced_at).to_not eq DomainBlock.find_by(domain: 'evil.org').created_at
+ end
+
it 'leaves the domains status and attachements, but clears media' do
expect { bad_status1.reload }.not_to raise_error
expect { bad_status2.reload }.not_to raise_error
end
it 'does not notify when sender is silenced and not followed' do
- sender.update(silenced: true)
+ sender.silence!
is_expected.to_not change(Notification, :count)
end
it 'does not notify when recipient is suspended' do
- recipient.update(suspended: true)
+ recipient.suspend!
is_expected.to_not change(Notification, :count)
end
describe 'call' do
before do
- @silenced = Fabricate(:account, domain: 'example.com', silenced: true)
- @suspended = Fabricate(:account, domain: 'example.com', suspended: true)
+ @independently_suspended = Fabricate(:account, domain: 'example.com', suspended_at: 1.hour.ago)
+ @independently_silenced = Fabricate(:account, domain: 'example.com', silenced_at: 1.hour.ago)
@domain_block = Fabricate(:domain_block, domain: 'example.com')
+ @silenced = Fabricate(:account, domain: 'example.com', silenced_at: @domain_block.created_at)
+ @suspended = Fabricate(:account, domain: 'example.com', suspended_at: @domain_block.created_at)
end
- context 'without retroactive' do
- it 'removes the domain block' do
- subject.call(@domain_block, false)
- expect_deleted_domain_block
- end
- end
-
- context 'with retroactive' do
- it 'unsilences accounts and removes block' do
- @domain_block.update(severity: :silence)
+ it 'unsilences accounts and removes block' do
+ @domain_block.update(severity: :silence)
- subject.call(@domain_block, true)
- expect_deleted_domain_block
- expect(@silenced.reload.silenced).to be false
- expect(@suspended.reload.suspended).to be true
- end
+ subject.call(@domain_block)
+ expect_deleted_domain_block
+ expect(@silenced.reload.silenced?).to be false
+ expect(@suspended.reload.suspended?).to be true
+ expect(@independently_suspended.reload.suspended?).to be true
+ expect(@independently_silenced.reload.silenced?).to be true
+ end
- it 'unsuspends accounts and removes block' do
- @domain_block.update(severity: :suspend)
+ it 'unsuspends accounts and removes block' do
+ @domain_block.update(severity: :suspend)
- subject.call(@domain_block, true)
- expect_deleted_domain_block
- expect(@suspended.reload.suspended).to be false
- expect(@silenced.reload.silenced).to be true
- end
+ subject.call(@domain_block)
+ expect_deleted_domain_block
+ expect(@suspended.reload.suspended?).to be false
+ expect(@silenced.reload.silenced?).to be true
+ expect(@independently_suspended.reload.suspended?).to be true
+ expect(@independently_silenced.reload.silenced?).to be true
end
end