2018-12-23 13:04:54 -07:00
|
|
|
# Pleroma: A lightweight social networking server
|
2021-01-12 23:49:20 -07:00
|
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 13:04:54 -07:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2018-04-14 05:31:12 -06:00
|
|
|
defmodule Pleroma.Web.ActivityPub.MRF.SimplePolicy do
|
2019-05-05 20:28:04 -06:00
|
|
|
@moduledoc "Filter activities depending on their origin instance"
|
2021-06-07 13:22:08 -06:00
|
|
|
@behaviour Pleroma.Web.ActivityPub.MRF.Policy
|
2018-04-14 05:31:12 -06:00
|
|
|
|
2020-03-21 00:47:05 -06:00
|
|
|
alias Pleroma.Config
|
2020-07-31 09:18:04 -06:00
|
|
|
alias Pleroma.FollowingRelationship
|
2020-03-21 00:47:05 -06:00
|
|
|
alias Pleroma.User
|
|
|
|
alias Pleroma.Web.ActivityPub.MRF
|
|
|
|
|
2019-07-28 20:43:19 -06:00
|
|
|
require Pleroma.Constants
|
|
|
|
|
2018-11-06 11:34:57 -07:00
|
|
|
defp check_accept(%{host: actor_host} = _actor_info, object) do
|
2019-07-22 08:33:58 -06:00
|
|
|
accepts =
|
2020-09-24 13:01:33 -06:00
|
|
|
instance_list(:accept)
|
2019-07-22 08:33:58 -06:00
|
|
|
|> MRF.subdomains_regex()
|
2018-04-14 05:31:12 -06:00
|
|
|
|
2018-11-06 11:34:57 -07:00
|
|
|
cond do
|
|
|
|
accepts == [] -> {:ok, object}
|
2020-03-21 00:47:05 -06:00
|
|
|
actor_host == Config.get([Pleroma.Web.Endpoint, :url, :host]) -> {:ok, object}
|
2019-07-22 08:33:58 -06:00
|
|
|
MRF.subdomain_match?(accepts, actor_host) -> {:ok, object}
|
2020-07-13 07:47:13 -06:00
|
|
|
true -> {:reject, "[SimplePolicy] host not in accept list"}
|
2018-11-06 11:34:57 -07:00
|
|
|
end
|
2018-06-19 15:23:37 -06:00
|
|
|
end
|
|
|
|
|
2018-11-06 11:34:57 -07:00
|
|
|
defp check_reject(%{host: actor_host} = _actor_info, object) do
|
2019-07-22 08:33:58 -06:00
|
|
|
rejects =
|
2020-09-24 13:01:33 -06:00
|
|
|
instance_list(:reject)
|
2019-07-22 08:33:58 -06:00
|
|
|
|> MRF.subdomains_regex()
|
|
|
|
|
|
|
|
if MRF.subdomain_match?(rejects, actor_host) do
|
2020-07-13 07:47:13 -06:00
|
|
|
{:reject, "[SimplePolicy] host in reject list"}
|
2018-11-06 11:34:57 -07:00
|
|
|
else
|
|
|
|
{:ok, object}
|
|
|
|
end
|
2018-04-14 05:31:12 -06:00
|
|
|
end
|
|
|
|
|
2018-11-06 11:34:57 -07:00
|
|
|
defp check_media_removal(
|
|
|
|
%{host: actor_host} = _actor_info,
|
2018-12-04 11:28:38 -07:00
|
|
|
%{"type" => "Create", "object" => %{"attachment" => child_attachment}} = object
|
2018-11-06 11:34:57 -07:00
|
|
|
)
|
2018-11-07 02:40:24 -07:00
|
|
|
when length(child_attachment) > 0 do
|
2019-07-22 08:33:58 -06:00
|
|
|
media_removal =
|
2020-09-24 13:01:33 -06:00
|
|
|
instance_list(:media_removal)
|
2019-07-22 08:33:58 -06:00
|
|
|
|> MRF.subdomains_regex()
|
|
|
|
|
2018-11-06 11:34:57 -07:00
|
|
|
object =
|
2019-07-22 08:33:58 -06:00
|
|
|
if MRF.subdomain_match?(media_removal, actor_host) do
|
2018-11-06 11:34:57 -07:00
|
|
|
child_object = Map.delete(object["object"], "attachment")
|
|
|
|
Map.put(object, "object", child_object)
|
|
|
|
else
|
|
|
|
object
|
|
|
|
end
|
2018-09-09 19:06:44 -06:00
|
|
|
|
|
|
|
{:ok, object}
|
2018-04-14 05:31:12 -06:00
|
|
|
end
|
|
|
|
|
2018-11-06 11:34:57 -07:00
|
|
|
defp check_media_removal(_actor_info, object), do: {:ok, object}
|
2018-09-09 18:53:37 -06:00
|
|
|
|
2018-09-09 19:06:44 -06:00
|
|
|
defp check_media_nsfw(
|
2018-11-06 11:34:57 -07:00
|
|
|
%{host: actor_host} = _actor_info,
|
2018-09-09 19:06:44 -06:00
|
|
|
%{
|
|
|
|
"type" => "Create",
|
2020-12-28 15:21:53 -07:00
|
|
|
"object" => %{} = _child_object
|
2018-09-09 19:06:44 -06:00
|
|
|
} = object
|
2020-12-28 15:21:53 -07:00
|
|
|
) do
|
2019-07-22 08:33:58 -06:00
|
|
|
media_nsfw =
|
2020-09-24 13:01:33 -06:00
|
|
|
instance_list(:media_nsfw)
|
2019-07-22 08:33:58 -06:00
|
|
|
|> MRF.subdomains_regex()
|
|
|
|
|
2018-11-06 11:34:57 -07:00
|
|
|
object =
|
2019-07-22 08:33:58 -06:00
|
|
|
if MRF.subdomain_match?(media_nsfw, actor_host) do
|
2020-12-28 15:21:53 -07:00
|
|
|
Kernel.put_in(object, ["object", "sensitive"], true)
|
2018-11-06 11:34:57 -07:00
|
|
|
else
|
|
|
|
object
|
|
|
|
end
|
|
|
|
|
2018-09-09 19:06:44 -06:00
|
|
|
{:ok, object}
|
2018-04-14 05:31:12 -06:00
|
|
|
end
|
|
|
|
|
2018-11-06 11:34:57 -07:00
|
|
|
defp check_media_nsfw(_actor_info, object), do: {:ok, object}
|
2018-04-14 05:31:12 -06:00
|
|
|
|
2018-11-06 11:34:57 -07:00
|
|
|
defp check_ftl_removal(%{host: actor_host} = _actor_info, object) do
|
2019-07-22 08:33:58 -06:00
|
|
|
timeline_removal =
|
2020-09-24 13:01:33 -06:00
|
|
|
instance_list(:federated_timeline_removal)
|
2019-07-22 08:33:58 -06:00
|
|
|
|> MRF.subdomains_regex()
|
|
|
|
|
2018-09-09 19:06:44 -06:00
|
|
|
object =
|
2019-07-22 08:33:58 -06:00
|
|
|
with true <- MRF.subdomain_match?(timeline_removal, actor_host),
|
2018-11-07 02:40:24 -07:00
|
|
|
user <- User.get_cached_by_ap_id(object["actor"]),
|
2019-07-28 20:43:19 -06:00
|
|
|
true <- Pleroma.Constants.as_public() in object["to"] do
|
|
|
|
to = List.delete(object["to"], Pleroma.Constants.as_public()) ++ [user.follower_address]
|
|
|
|
|
|
|
|
cc = List.delete(object["cc"], user.follower_address) ++ [Pleroma.Constants.as_public()]
|
2018-09-09 19:06:44 -06:00
|
|
|
|
|
|
|
object
|
|
|
|
|> Map.put("to", to)
|
|
|
|
|> Map.put("cc", cc)
|
|
|
|
else
|
2018-11-06 11:34:57 -07:00
|
|
|
_ -> object
|
2018-09-09 19:06:44 -06:00
|
|
|
end
|
|
|
|
|
|
|
|
{:ok, object}
|
2018-04-14 05:31:12 -06:00
|
|
|
end
|
|
|
|
|
2020-07-31 09:18:04 -06:00
|
|
|
defp intersection(list1, list2) do
|
|
|
|
list1 -- list1 -- list2
|
|
|
|
end
|
|
|
|
|
|
|
|
defp check_followers_only(%{host: actor_host} = _actor_info, object) do
|
|
|
|
followers_only =
|
2020-09-24 13:01:33 -06:00
|
|
|
instance_list(:followers_only)
|
2020-07-31 09:18:04 -06:00
|
|
|
|> MRF.subdomains_regex()
|
|
|
|
|
|
|
|
object =
|
|
|
|
with true <- MRF.subdomain_match?(followers_only, actor_host),
|
|
|
|
user <- User.get_cached_by_ap_id(object["actor"]) do
|
|
|
|
# Don't use Map.get/3 intentionally, these must not be nil
|
|
|
|
fixed_to = object["to"] || []
|
|
|
|
fixed_cc = object["cc"] || []
|
|
|
|
|
|
|
|
to = FollowingRelationship.followers_ap_ids(user, fixed_to)
|
|
|
|
cc = FollowingRelationship.followers_ap_ids(user, fixed_cc)
|
|
|
|
|
|
|
|
object
|
|
|
|
|> Map.put("to", intersection([user.follower_address | to], fixed_to))
|
|
|
|
|> Map.put("cc", intersection([user.follower_address | cc], fixed_cc))
|
|
|
|
else
|
|
|
|
_ -> object
|
|
|
|
end
|
|
|
|
|
|
|
|
{:ok, object}
|
|
|
|
end
|
|
|
|
|
2019-05-19 16:02:50 -06:00
|
|
|
defp check_report_removal(%{host: actor_host} = _actor_info, %{"type" => "Flag"} = object) do
|
2019-07-22 08:33:58 -06:00
|
|
|
report_removal =
|
2020-09-24 13:01:33 -06:00
|
|
|
instance_list(:report_removal)
|
2019-07-22 08:33:58 -06:00
|
|
|
|> MRF.subdomains_regex()
|
|
|
|
|
|
|
|
if MRF.subdomain_match?(report_removal, actor_host) do
|
2020-07-13 07:47:13 -06:00
|
|
|
{:reject, "[SimplePolicy] host in report_removal list"}
|
2019-05-19 16:02:50 -06:00
|
|
|
else
|
|
|
|
{:ok, object}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
defp check_report_removal(_actor_info, object), do: {:ok, object}
|
|
|
|
|
2019-05-21 22:55:16 -06:00
|
|
|
defp check_avatar_removal(%{host: actor_host} = _actor_info, %{"icon" => _icon} = object) do
|
2019-07-22 08:33:58 -06:00
|
|
|
avatar_removal =
|
2020-09-24 13:01:33 -06:00
|
|
|
instance_list(:avatar_removal)
|
2019-07-22 08:33:58 -06:00
|
|
|
|> MRF.subdomains_regex()
|
|
|
|
|
|
|
|
if MRF.subdomain_match?(avatar_removal, actor_host) do
|
2019-05-21 22:55:16 -06:00
|
|
|
{:ok, Map.delete(object, "icon")}
|
|
|
|
else
|
|
|
|
{:ok, object}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
defp check_avatar_removal(_actor_info, object), do: {:ok, object}
|
|
|
|
|
|
|
|
defp check_banner_removal(%{host: actor_host} = _actor_info, %{"image" => _image} = object) do
|
2019-07-22 08:33:58 -06:00
|
|
|
banner_removal =
|
2020-09-24 13:01:33 -06:00
|
|
|
instance_list(:banner_removal)
|
2019-07-22 08:33:58 -06:00
|
|
|
|> MRF.subdomains_regex()
|
|
|
|
|
|
|
|
if MRF.subdomain_match?(banner_removal, actor_host) do
|
2019-05-21 22:55:16 -06:00
|
|
|
{:ok, Map.delete(object, "image")}
|
|
|
|
else
|
|
|
|
{:ok, object}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
defp check_banner_removal(_actor_info, object), do: {:ok, object}
|
|
|
|
|
2021-04-29 10:51:49 -06:00
|
|
|
defp check_object(%{"object" => object} = activity) do
|
2021-03-18 14:31:50 -06:00
|
|
|
with {:ok, _object} <- filter(object) do
|
|
|
|
{:ok, activity}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
defp check_object(object), do: {:ok, object}
|
|
|
|
|
2020-09-24 13:01:33 -06:00
|
|
|
defp instance_list(config_key) do
|
|
|
|
Config.get([:mrf_simple, config_key])
|
2020-10-02 06:51:39 -06:00
|
|
|
|> MRF.instance_list_from_tuples()
|
2020-09-24 13:01:33 -06:00
|
|
|
end
|
|
|
|
|
2020-04-12 19:26:35 -06:00
|
|
|
@impl true
|
2020-04-13 12:48:32 -06:00
|
|
|
def filter(%{"type" => "Delete", "actor" => actor} = object) do
|
|
|
|
%{host: actor_host} = URI.parse(actor)
|
|
|
|
|
|
|
|
reject_deletes =
|
2020-09-24 13:01:33 -06:00
|
|
|
instance_list(:reject_deletes)
|
2020-04-13 12:48:32 -06:00
|
|
|
|> MRF.subdomains_regex()
|
|
|
|
|
|
|
|
if MRF.subdomain_match?(reject_deletes, actor_host) do
|
2020-07-13 07:47:13 -06:00
|
|
|
{:reject, "[SimplePolicy] host in reject_deletes list"}
|
2020-04-13 12:48:32 -06:00
|
|
|
else
|
|
|
|
{:ok, object}
|
|
|
|
end
|
|
|
|
end
|
2020-04-12 19:26:35 -06:00
|
|
|
|
2018-05-10 10:34:09 -06:00
|
|
|
@impl true
|
2019-05-21 22:15:59 -06:00
|
|
|
def filter(%{"actor" => actor} = object) do
|
|
|
|
actor_info = URI.parse(actor)
|
2018-04-14 05:31:12 -06:00
|
|
|
|
2018-06-19 15:23:37 -06:00
|
|
|
with {:ok, object} <- check_accept(actor_info, object),
|
|
|
|
{:ok, object} <- check_reject(actor_info, object),
|
2018-04-14 05:31:12 -06:00
|
|
|
{:ok, object} <- check_media_removal(actor_info, object),
|
|
|
|
{:ok, object} <- check_media_nsfw(actor_info, object),
|
2019-05-19 16:02:50 -06:00
|
|
|
{:ok, object} <- check_ftl_removal(actor_info, object),
|
2020-07-31 09:18:04 -06:00
|
|
|
{:ok, object} <- check_followers_only(actor_info, object),
|
2021-03-18 14:31:50 -06:00
|
|
|
{:ok, object} <- check_report_removal(actor_info, object),
|
|
|
|
{:ok, object} <- check_object(object) do
|
2018-04-14 05:31:12 -06:00
|
|
|
{:ok, object}
|
|
|
|
else
|
2020-07-13 07:47:13 -06:00
|
|
|
{:reject, nil} -> {:reject, "[SimplePolicy]"}
|
|
|
|
{:reject, _} = e -> e
|
|
|
|
_ -> {:reject, "[SimplePolicy]"}
|
2018-04-14 05:31:12 -06:00
|
|
|
end
|
|
|
|
end
|
2019-05-21 22:15:59 -06:00
|
|
|
|
2019-05-21 22:55:16 -06:00
|
|
|
def filter(%{"id" => actor, "type" => obj_type} = object)
|
|
|
|
when obj_type in ["Application", "Group", "Organization", "Person", "Service"] do
|
|
|
|
actor_info = URI.parse(actor)
|
|
|
|
|
2019-10-06 18:55:09 -06:00
|
|
|
with {:ok, object} <- check_accept(actor_info, object),
|
|
|
|
{:ok, object} <- check_reject(actor_info, object),
|
|
|
|
{:ok, object} <- check_avatar_removal(actor_info, object),
|
2019-05-21 22:55:16 -06:00
|
|
|
{:ok, object} <- check_banner_removal(actor_info, object) do
|
|
|
|
{:ok, object}
|
|
|
|
else
|
2020-07-13 07:47:13 -06:00
|
|
|
{:reject, nil} -> {:reject, "[SimplePolicy]"}
|
|
|
|
{:reject, _} = e -> e
|
|
|
|
_ -> {:reject, "[SimplePolicy]"}
|
2019-05-21 22:55:16 -06:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-04-29 10:51:49 -06:00
|
|
|
def filter(object) when is_binary(object) do
|
|
|
|
uri = URI.parse(object)
|
|
|
|
|
|
|
|
with {:ok, object} <- check_accept(uri, object),
|
|
|
|
{:ok, object} <- check_reject(uri, object) do
|
|
|
|
{:ok, object}
|
|
|
|
else
|
|
|
|
{:reject, nil} -> {:reject, "[SimplePolicy]"}
|
|
|
|
{:reject, _} = e -> e
|
|
|
|
_ -> {:reject, "[SimplePolicy]"}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-05-21 22:15:59 -06:00
|
|
|
def filter(object), do: {:ok, object}
|
2019-08-13 15:52:54 -06:00
|
|
|
|
2022-08-27 04:57:57 -06:00
|
|
|
defp obfuscate(string) when is_binary(string) do
|
|
|
|
string
|
|
|
|
|> to_charlist()
|
|
|
|
|> Enum.with_index()
|
|
|
|
|> Enum.map(fn
|
|
|
|
{?., _index} ->
|
|
|
|
?.
|
|
|
|
|
|
|
|
{char, index} ->
|
|
|
|
if 3 <= index && index < String.length(string) - 3, do: ?*, else: char
|
|
|
|
end)
|
|
|
|
|> to_string()
|
|
|
|
end
|
|
|
|
|
|
|
|
defp maybe_obfuscate(host, obfuscations) do
|
|
|
|
if MRF.subdomain_match?(obfuscations, host) do
|
|
|
|
obfuscate(host)
|
|
|
|
else
|
|
|
|
host
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-08-13 15:52:54 -06:00
|
|
|
@impl true
|
2019-08-13 16:36:24 -06:00
|
|
|
def describe do
|
2020-10-02 11:08:04 -06:00
|
|
|
exclusions = Config.get([:mrf, :transparency_exclusions]) |> MRF.instance_list_from_tuples()
|
2019-08-13 15:52:54 -06:00
|
|
|
|
2022-08-27 04:57:57 -06:00
|
|
|
obfuscations =
|
|
|
|
Config.get([:mrf, :transparency_obfuscate_domains], []) |> MRF.subdomains_regex()
|
|
|
|
|
2020-11-20 05:48:28 -07:00
|
|
|
mrf_simple_excluded =
|
2020-03-21 00:47:05 -06:00
|
|
|
Config.get(:mrf_simple)
|
2021-02-04 06:23:21 -07:00
|
|
|
|> Enum.map(fn {rule, instances} ->
|
|
|
|
{rule, Enum.reject(instances, fn {host, _} -> host in exclusions end)}
|
|
|
|
end)
|
2020-11-20 05:48:28 -07:00
|
|
|
|
|
|
|
mrf_simple =
|
|
|
|
mrf_simple_excluded
|
2021-02-04 06:23:21 -07:00
|
|
|
|> Enum.map(fn {rule, instances} ->
|
2022-08-27 04:57:57 -06:00
|
|
|
{rule, Enum.map(instances, fn {host, _} -> maybe_obfuscate(host, obfuscations) end)}
|
2020-11-20 05:48:28 -07:00
|
|
|
end)
|
2021-02-04 06:23:21 -07:00
|
|
|
|> Map.new()
|
2020-11-20 05:48:28 -07:00
|
|
|
|
2020-12-18 06:29:38 -07:00
|
|
|
# This is for backwards compatibility. We originally didn't sent
|
|
|
|
# extra info like a reason why an instance was rejected/quarantined/etc.
|
|
|
|
# Because we didn't want to break backwards compatibility it was decided
|
|
|
|
# to add an extra "info" key.
|
2020-11-20 05:48:28 -07:00
|
|
|
mrf_simple_info =
|
|
|
|
mrf_simple_excluded
|
2021-02-04 06:23:21 -07:00
|
|
|
|> Enum.map(fn {rule, instances} ->
|
|
|
|
{rule, Enum.reject(instances, fn {_, reason} -> reason == "" end)}
|
|
|
|
end)
|
|
|
|
|> Enum.reject(fn {_, instances} -> instances == [] end)
|
|
|
|
|> Enum.map(fn {rule, instances} ->
|
|
|
|
instances =
|
|
|
|
instances
|
2022-08-27 04:57:57 -06:00
|
|
|
|> Enum.map(fn {host, reason} ->
|
|
|
|
{maybe_obfuscate(host, obfuscations), %{"reason" => reason}}
|
|
|
|
end)
|
2021-02-04 06:23:21 -07:00
|
|
|
|> Map.new()
|
|
|
|
|
|
|
|
{rule, instances}
|
2020-10-23 12:27:13 -06:00
|
|
|
end)
|
2021-02-04 06:23:21 -07:00
|
|
|
|> Map.new()
|
2019-08-13 15:52:54 -06:00
|
|
|
|
2020-11-20 05:48:28 -07:00
|
|
|
{:ok, %{mrf_simple: mrf_simple, mrf_simple_info: mrf_simple_info}}
|
2019-08-13 15:52:54 -06:00
|
|
|
end
|
2020-11-10 09:18:53 -07:00
|
|
|
|
|
|
|
@impl true
|
|
|
|
def config_description do
|
|
|
|
%{
|
|
|
|
key: :mrf_simple,
|
|
|
|
related_policy: "Pleroma.Web.ActivityPub.MRF.SimplePolicy",
|
|
|
|
label: "MRF Simple",
|
|
|
|
description: "Simple ingress policies",
|
2020-09-24 13:01:33 -06:00
|
|
|
children:
|
|
|
|
[
|
|
|
|
%{
|
|
|
|
key: :media_removal,
|
|
|
|
description:
|
|
|
|
"List of instances to strip media attachments from and the reason for doing so"
|
|
|
|
},
|
|
|
|
%{
|
|
|
|
key: :media_nsfw,
|
|
|
|
label: "Media NSFW",
|
|
|
|
description:
|
|
|
|
"List of instances to tag all media as NSFW (sensitive) from and the reason for doing so"
|
|
|
|
},
|
|
|
|
%{
|
|
|
|
key: :federated_timeline_removal,
|
|
|
|
description:
|
|
|
|
"List of instances to remove from the Federated (aka The Whole Known Network) Timeline and the reason for doing so"
|
|
|
|
},
|
|
|
|
%{
|
|
|
|
key: :reject,
|
|
|
|
description:
|
|
|
|
"List of instances to reject activities from (except deletes) and the reason for doing so"
|
|
|
|
},
|
|
|
|
%{
|
|
|
|
key: :accept,
|
|
|
|
description:
|
|
|
|
"List of instances to only accept activities from (except deletes) and the reason for doing so"
|
|
|
|
},
|
|
|
|
%{
|
|
|
|
key: :followers_only,
|
|
|
|
description:
|
|
|
|
"Force posts from the given instances to be visible by followers only and the reason for doing so"
|
|
|
|
},
|
|
|
|
%{
|
|
|
|
key: :report_removal,
|
|
|
|
description: "List of instances to reject reports from and the reason for doing so"
|
|
|
|
},
|
|
|
|
%{
|
|
|
|
key: :avatar_removal,
|
|
|
|
description: "List of instances to strip avatars from and the reason for doing so"
|
|
|
|
},
|
|
|
|
%{
|
|
|
|
key: :banner_removal,
|
|
|
|
description: "List of instances to strip banners from and the reason for doing so"
|
|
|
|
},
|
|
|
|
%{
|
|
|
|
key: :reject_deletes,
|
|
|
|
description: "List of instances to reject deletions from and the reason for doing so"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
|> Enum.map(fn setting ->
|
|
|
|
Map.merge(
|
|
|
|
setting,
|
|
|
|
%{
|
|
|
|
type: {:list, :tuple},
|
|
|
|
key_placeholder: "instance",
|
|
|
|
value_placeholder: "reason",
|
|
|
|
suggestions: [{"example.com", "Some reason"}, {"*.example.com", "Another reason"}]
|
|
|
|
}
|
|
|
|
)
|
|
|
|
end)
|
2020-11-10 09:18:53 -07:00
|
|
|
}
|
|
|
|
end
|
2018-04-14 05:31:12 -06:00
|
|
|
end
|