Remove the terms blacklist and whitelist from UX (#14149)
Localization strings: - "Whitelist mode" -> "Limited federation mode" - "Blacklist e-mail domain" -> "Block e-mail domain" - "Whitelist domain" -> "Allow domain for federation" ...And so on Environment variables (backwards-compatible): - `WHITELIST_MODE` -> `LIMITED_FEDERATION_MODE` - `EMAIL_DOMAIN_BLACKLIST` -> `EMAIL_DOMAIN_DENYLIST` - `EMAIL_DOMAIN_WHITELIST` -> `EMAIL_DOMAIN_ALLOWLIST` tootctl: - `tootctl domains purge --whitelist-mode` -> `tootctl domains purge --limited-federation-mode` Removed badly maintained and no longer relevant .env.production.sample file
This commit is contained in:
		
							parent
							
								
									4662afe075
								
							
						
					
					
						commit
						8c04e37b03
					
				
					 5 changed files with 24 additions and 286 deletions
				
			
		|  | @ -1,262 +0,0 @@ | |||
| # Service dependencies | ||||
| # You may set REDIS_URL instead for more advanced options | ||||
| # You may also set REDIS_NAMESPACE to share Redis between multiple Mastodon servers | ||||
| REDIS_HOST=redis | ||||
| REDIS_PORT=6379 | ||||
| # You may set DATABASE_URL instead for more advanced options | ||||
| DB_HOST=db | ||||
| DB_USER=postgres | ||||
| DB_NAME=postgres | ||||
| DB_PASS= | ||||
| DB_PORT=5432 | ||||
| # Optional ElasticSearch configuration | ||||
| # You may also set ES_PREFIX to share the same cluster between multiple Mastodon servers (falls back to REDIS_NAMESPACE if not set) | ||||
| # ES_ENABLED=true | ||||
| # ES_HOST=es | ||||
| # ES_PORT=9200 | ||||
| 
 | ||||
| # Federation | ||||
| # Note: Changing LOCAL_DOMAIN at a later time will cause unwanted side effects, including breaking all existing federation. | ||||
| # LOCAL_DOMAIN should *NOT* contain the protocol part of the domain e.g https://example.com. | ||||
| LOCAL_DOMAIN=example.com | ||||
| 
 | ||||
| # Changing LOCAL_HTTPS in production is no longer supported. (Mastodon will always serve https:// links) | ||||
| 
 | ||||
| # Use this only if you need to run mastodon on a different domain than the one used for federation. | ||||
| # You can read more about this option on https://github.com/tootsuite/documentation/blob/master/Running-Mastodon/Serving_a_different_domain.md | ||||
| # DO *NOT* USE THIS UNLESS YOU KNOW *EXACTLY* WHAT YOU ARE DOING. | ||||
| # WEB_DOMAIN=mastodon.example.com | ||||
| 
 | ||||
| # Use this if you want to have several aliases handler@example1.com | ||||
| # handler@example2.com etc. for the same user. LOCAL_DOMAIN should not | ||||
| # be added. Comma separated values | ||||
| # ALTERNATE_DOMAINS=example1.com,example2.com | ||||
| 
 | ||||
| # Application secrets | ||||
| # Generate each with the `RAILS_ENV=production bundle exec rake secret` task (`docker-compose run --rm web bundle exec rake secret` if you use docker compose) | ||||
| SECRET_KEY_BASE= | ||||
| OTP_SECRET= | ||||
| 
 | ||||
| # VAPID keys (used for push notifications | ||||
| # You can generate the keys using the following command (first is the private key, second is the public one) | ||||
| # You should only generate this once per instance. If you later decide to change it, all push subscription will | ||||
| # be invalidated, requiring the users to access the website again to resubscribe. | ||||
| # | ||||
| # Generate with `RAILS_ENV=production bundle exec rake mastodon:webpush:generate_vapid_key` task (`docker-compose run --rm web bundle exec rake mastodon:webpush:generate_vapid_key` if you use docker compose) | ||||
| # | ||||
| # For more information visit https://rossta.net/blog/using-the-web-push-api-with-vapid.html | ||||
| VAPID_PRIVATE_KEY= | ||||
| VAPID_PUBLIC_KEY= | ||||
| 
 | ||||
| # Registrations | ||||
| # Single user mode will disable registrations and redirect frontpage to the first profile | ||||
| # SINGLE_USER_MODE=true | ||||
| # Prevent registrations with following e-mail domains | ||||
| # EMAIL_DOMAIN_BLACKLIST=example1.com|example2.de|etc | ||||
| # Only allow registrations with the following e-mail domains | ||||
| # EMAIL_DOMAIN_WHITELIST=example1.com|example2.de|etc | ||||
| 
 | ||||
| # Optionally change default language | ||||
| # DEFAULT_LOCALE=de | ||||
| 
 | ||||
| # E-mail configuration | ||||
| # Note: Mailgun and SparkPost (https://sparkpo.st/smtp) each have good free tiers | ||||
| # If you want to use an SMTP server without authentication (e.g local Postfix relay) | ||||
| # then set SMTP_AUTH_METHOD and SMTP_OPENSSL_VERIFY_MODE to 'none' and | ||||
| # *comment* SMTP_LOGIN and SMTP_PASSWORD (leaving them blank is not enough). | ||||
| SMTP_SERVER=smtp.mailgun.org | ||||
| SMTP_PORT=587 | ||||
| SMTP_LOGIN= | ||||
| SMTP_PASSWORD= | ||||
| SMTP_FROM_ADDRESS=notifications@example.com | ||||
| #SMTP_REPLY_TO= | ||||
| #SMTP_DOMAIN= # defaults to LOCAL_DOMAIN | ||||
| #SMTP_DELIVERY_METHOD=smtp # delivery method can also be sendmail | ||||
| #SMTP_AUTH_METHOD=plain | ||||
| #SMTP_CA_FILE=/etc/ssl/certs/ca-certificates.crt | ||||
| #SMTP_OPENSSL_VERIFY_MODE=peer | ||||
| #SMTP_ENABLE_STARTTLS_AUTO=true | ||||
| #SMTP_TLS=true | ||||
| 
 | ||||
| # Optional user upload path and URL (images, avatars). Default is :rails_root/public/system. If you set this variable, you are responsible for making your HTTP server (eg. nginx) serve these files. | ||||
| # PAPERCLIP_ROOT_PATH=/var/lib/mastodon/public-system | ||||
| # PAPERCLIP_ROOT_URL=/system | ||||
| 
 | ||||
| # Optional asset host for multi-server setups | ||||
| # The asset host must allow cross origin request from WEB_DOMAIN or LOCAL_DOMAIN | ||||
| # if WEB_DOMAIN is not set. For example, the server may have the | ||||
| # following header field: | ||||
| # Access-Control-Allow-Origin: https://example.com/ | ||||
| # CDN_HOST=https://assets.example.com | ||||
| 
 | ||||
| # S3 (optional) | ||||
| # The attachment host must allow cross origin request from WEB_DOMAIN or | ||||
| # LOCAL_DOMAIN if WEB_DOMAIN is not set. For example, the server may have the | ||||
| # following header field: | ||||
| # Access-Control-Allow-Origin: https://192.168.1.123:9000/ | ||||
| # S3_ENABLED=true | ||||
| # S3_BUCKET= | ||||
| # AWS_ACCESS_KEY_ID= | ||||
| # AWS_SECRET_ACCESS_KEY= | ||||
| # S3_REGION= | ||||
| # S3_PROTOCOL=http | ||||
| # S3_HOSTNAME=192.168.1.123:9000 | ||||
| 
 | ||||
| # S3 (Minio Config (optional) Please check Minio instance for details) | ||||
| # The attachment host must allow cross origin request - see the description | ||||
| # above. | ||||
| # S3_ENABLED=true | ||||
| # S3_BUCKET= | ||||
| # AWS_ACCESS_KEY_ID= | ||||
| # AWS_SECRET_ACCESS_KEY= | ||||
| # S3_REGION= | ||||
| # S3_PROTOCOL=https | ||||
| # S3_HOSTNAME= | ||||
| # S3_ENDPOINT= | ||||
| # S3_SIGNATURE_VERSION= | ||||
| 
 | ||||
| # Google Cloud Storage (optional) | ||||
| # Use S3 compatible API. Since GCS does not support Multipart Upload, | ||||
| # increase the value of S3_MULTIPART_THRESHOLD to disable Multipart Upload. | ||||
| # The attachment host must allow cross origin request - see the description | ||||
| # above. | ||||
| # S3_ENABLED=true | ||||
| # AWS_ACCESS_KEY_ID= | ||||
| # AWS_SECRET_ACCESS_KEY= | ||||
| # S3_REGION= | ||||
| # S3_PROTOCOL=https | ||||
| # S3_HOSTNAME=storage.googleapis.com | ||||
| # S3_ENDPOINT=https://storage.googleapis.com | ||||
| # S3_MULTIPART_THRESHOLD=52428801 # 50.megabytes | ||||
| 
 | ||||
| # Swift (optional) | ||||
| # The attachment host must allow cross origin request - see the description | ||||
| # above. | ||||
| # SWIFT_ENABLED=true | ||||
| # SWIFT_USERNAME= | ||||
| # For Keystone V3, the value for SWIFT_TENANT should be the project name | ||||
| # SWIFT_TENANT= | ||||
| # SWIFT_PASSWORD= | ||||
| # Some OpenStack V3 providers require PROJECT_ID (optional) | ||||
| # SWIFT_PROJECT_ID= | ||||
| # Keystone V2 and V3 URLs are supported. Use a V3 URL if possible to avoid | ||||
| # issues with token rate-limiting during high load. | ||||
| # SWIFT_AUTH_URL= | ||||
| # SWIFT_CONTAINER= | ||||
| # SWIFT_OBJECT_URL= | ||||
| # SWIFT_REGION= | ||||
| # Defaults to 'default' | ||||
| # SWIFT_DOMAIN_NAME= | ||||
| # Defaults to 60 seconds. Set to 0 to disable | ||||
| # SWIFT_CACHE_TTL= | ||||
| 
 | ||||
| # Optional alias for S3 (e.g. to serve files on a custom domain, possibly using Cloudfront or Cloudflare) | ||||
| # S3_ALIAS_HOST= | ||||
| 
 | ||||
| # Streaming API integration | ||||
| # STREAMING_API_BASE_URL= | ||||
| 
 | ||||
| # Advanced settings | ||||
| # If you need to use pgBouncer, you need to disable prepared statements: | ||||
| # PREPARED_STATEMENTS=false | ||||
| 
 | ||||
| # Cluster number setting for streaming API server. | ||||
| # If you comment out following line, cluster number will be `numOfCpuCores - 1`. | ||||
| STREAMING_CLUSTER_NUM=1 | ||||
| 
 | ||||
| # Docker mastodon user | ||||
| # If you use Docker, you may want to assign UID/GID manually. | ||||
| # UID=1000 | ||||
| # GID=1000 | ||||
| 
 | ||||
| # LDAP authentication (optional) | ||||
| # LDAP_ENABLED=true | ||||
| # LDAP_HOST=localhost | ||||
| # LDAP_PORT=389 | ||||
| # LDAP_METHOD=simple_tls | ||||
| # LDAP_BASE= | ||||
| # LDAP_BIND_DN= | ||||
| # LDAP_PASSWORD= | ||||
| # LDAP_UID=cn | ||||
| # LDAP_MAIL=mail | ||||
| # LDAP_SEARCH_FILTER=(|(%{uid}=%{email})(%{mail}=%{email})) | ||||
| # LDAP_UID_CONVERSION_ENABLED=true | ||||
| # LDAP_UID_CONVERSION_SEARCH=., - | ||||
| # LDAP_UID_CONVERSION_REPLACE=_ | ||||
| 
 | ||||
| # PAM authentication (optional) | ||||
| # PAM authentication uses for the email generation the "email" pam variable | ||||
| # and optional as fallback PAM_DEFAULT_SUFFIX | ||||
| # The pam environment variable "email" is provided by: | ||||
| # https://github.com/devkral/pam_email_extractor | ||||
| # PAM_ENABLED=true | ||||
| # Fallback email domain for email address generation (LOCAL_DOMAIN by default) | ||||
| # PAM_EMAIL_DOMAIN=example.com | ||||
| # Name of the pam service (pam "auth" section is evaluated) | ||||
| # PAM_DEFAULT_SERVICE=rpam | ||||
| # Name of the pam service used for checking if an user can register (pam "account" section is evaluated) (nil (disabled) by default) | ||||
| # PAM_CONTROLLED_SERVICE=rpam | ||||
| 
 | ||||
| # Global OAuth settings (optional) : | ||||
| # If you have only one strategy, you may want to enable this | ||||
| # OAUTH_REDIRECT_AT_SIGN_IN=true | ||||
| 
 | ||||
| # Optional CAS authentication (cf. omniauth-cas) : | ||||
| # CAS_ENABLED=true | ||||
| # CAS_URL=https://sso.myserver.com/ | ||||
| # CAS_HOST=sso.myserver.com/ | ||||
| # CAS_PORT=443 | ||||
| # CAS_SSL=true | ||||
| # CAS_VALIDATE_URL= | ||||
| # CAS_CALLBACK_URL= | ||||
| # CAS_LOGOUT_URL= | ||||
| # CAS_LOGIN_URL= | ||||
| # CAS_UID_FIELD='user' | ||||
| # CAS_CA_PATH= | ||||
| # CAS_DISABLE_SSL_VERIFICATION=false | ||||
| # CAS_UID_KEY='user' | ||||
| # CAS_NAME_KEY='name' | ||||
| # CAS_EMAIL_KEY='email' | ||||
| # CAS_NICKNAME_KEY='nickname' | ||||
| # CAS_FIRST_NAME_KEY='firstname' | ||||
| # CAS_LAST_NAME_KEY='lastname' | ||||
| # CAS_LOCATION_KEY='location' | ||||
| # CAS_IMAGE_KEY='image' | ||||
| # CAS_PHONE_KEY='phone' | ||||
| 
 | ||||
| # Optional SAML authentication (cf. omniauth-saml) | ||||
| # SAML_ENABLED=true | ||||
| # SAML_ACS_URL=http://localhost:3000/auth/auth/saml/callback | ||||
| # SAML_ISSUER=https://example.com | ||||
| # SAML_IDP_SSO_TARGET_URL=https://idp.testshib.org/idp/profile/SAML2/Redirect/SSO | ||||
| # SAML_IDP_CERT= | ||||
| # SAML_IDP_CERT_FINGERPRINT= | ||||
| # SAML_NAME_IDENTIFIER_FORMAT= | ||||
| # SAML_CERT= | ||||
| # SAML_PRIVATE_KEY= | ||||
| # SAML_SECURITY_WANT_ASSERTION_SIGNED=true | ||||
| # SAML_SECURITY_WANT_ASSERTION_ENCRYPTED=true | ||||
| # SAML_SECURITY_ASSUME_EMAIL_IS_VERIFIED=true | ||||
| # SAML_ATTRIBUTES_STATEMENTS_UID="urn:oid:0.9.2342.19200300.100.1.1" | ||||
| # SAML_ATTRIBUTES_STATEMENTS_EMAIL="urn:oid:1.3.6.1.4.1.5923.1.1.1.6" | ||||
| # SAML_ATTRIBUTES_STATEMENTS_FULL_NAME="urn:oid:2.16.840.1.113730.3.1.241" | ||||
| # SAML_ATTRIBUTES_STATEMENTS_FIRST_NAME="urn:oid:2.5.4.42" | ||||
| # SAML_ATTRIBUTES_STATEMENTS_LAST_NAME="urn:oid:2.5.4.4" | ||||
| # SAML_UID_ATTRIBUTE="urn:oid:0.9.2342.19200300.100.1.1" | ||||
| # SAML_ATTRIBUTES_STATEMENTS_VERIFIED= | ||||
| # SAML_ATTRIBUTES_STATEMENTS_VERIFIED_EMAIL= | ||||
| 
 | ||||
| # Use HTTP proxy for outgoing request (optional) | ||||
| # http_proxy=http://gateway.local:8118 | ||||
| # Access control for hidden service. | ||||
| # ALLOW_ACCESS_TO_HIDDEN_SERVICE=true | ||||
| 
 | ||||
| # Authorized fetch mode (optional) | ||||
| # Require remote servers to authentify when fetching toots, see | ||||
| # https://docs.joinmastodon.org/admin/config/#authorized_fetch | ||||
| # AUTHORIZED_FETCH=true | ||||
| 
 | ||||
| # Whitelist mode (optional) | ||||
| # Only allow federation with whitelisted domains, see | ||||
| # https://docs.joinmastodon.org/admin/config/#whitelist_mode | ||||
| # WHITELIST_MODE=true | ||||
|  | @ -1,5 +1,5 @@ | |||
| # frozen_string_literal: true | ||||
| 
 | ||||
| Rails.application.configure do | ||||
|   config.x.whitelist_mode = ENV['WHITELIST_MODE'] == 'true' | ||||
|   config.x.whitelist_mode = (ENV['LIMITED_FEDERATION_MODE'] || ENV['WHITELIST_MODE']) == 'true' | ||||
| end | ||||
|  |  | |||
|  | @ -1,6 +1,6 @@ | |||
| # frozen_string_literal: true | ||||
| 
 | ||||
| Rails.application.configure do | ||||
|   config.x.email_domains_blacklist = ENV.fetch('EMAIL_DOMAIN_BLACKLIST') { 'mvrht.com' } | ||||
|   config.x.email_domains_whitelist = ENV.fetch('EMAIL_DOMAIN_WHITELIST') { '' } | ||||
|   config.x.email_domains_blacklist = (ENV['EMAIL_DOMAIN_DENYLIST']  || ENV['EMAIL_DOMAIN_BLACKLIST']) || '' | ||||
|   config.x.email_domains_whitelist = (ENV['EMAIL_DOMAIN_ALLOWLIST'] || ENV['EMAIL_DOMAIN_WHITELIST']) || '' | ||||
| end | ||||
|  |  | |||
|  | @ -95,7 +95,7 @@ en: | |||
|       delete: Delete | ||||
|       destroyed_msg: Moderation note successfully destroyed! | ||||
|     accounts: | ||||
|       add_email_domain_block: Blacklist e-mail domain | ||||
|       add_email_domain_block: Block e-mail domain | ||||
|       approve: Approve | ||||
|       approve_all: Approve all | ||||
|       are_you_sure: Are you sure? | ||||
|  | @ -196,7 +196,7 @@ en: | |||
|       username: Username | ||||
|       warn: Warn | ||||
|       web: Web | ||||
|       whitelisted: Whitelisted | ||||
|       whitelisted: Allowed for federation | ||||
|     action_logs: | ||||
|       action_types: | ||||
|         assigned_to_self_report: Assign Report | ||||
|  | @ -241,15 +241,15 @@ en: | |||
|         create_account_warning: "%{name} sent a warning to %{target}" | ||||
|         create_announcement: "%{name} created new announcement %{target}" | ||||
|         create_custom_emoji: "%{name} uploaded new emoji %{target}" | ||||
|         create_domain_allow: "%{name} whitelisted domain %{target}" | ||||
|         create_domain_allow: "%{name} allowed federation with domain %{target}" | ||||
|         create_domain_block: "%{name} blocked domain %{target}" | ||||
|         create_email_domain_block: "%{name} blacklisted e-mail domain %{target}" | ||||
|         create_email_domain_block: "%{name} blocked e-mail domain %{target}" | ||||
|         demote_user: "%{name} demoted user %{target}" | ||||
|         destroy_announcement: "%{name} deleted announcement %{target}" | ||||
|         destroy_custom_emoji: "%{name} destroyed emoji %{target}" | ||||
|         destroy_domain_allow: "%{name} removed domain %{target} from whitelist" | ||||
|         destroy_domain_allow: "%{name} disallowed federation with domain %{target}" | ||||
|         destroy_domain_block: "%{name} unblocked domain %{target}" | ||||
|         destroy_email_domain_block: "%{name} whitelisted e-mail domain %{target}" | ||||
|         destroy_email_domain_block: "%{name} unblocked e-mail domain %{target}" | ||||
|         destroy_status: "%{name} removed status by %{target}" | ||||
|         disable_2fa_user: "%{name} disabled two factor requirement for user %{target}" | ||||
|         disable_custom_emoji: "%{name} disabled emoji %{target}" | ||||
|  | @ -350,12 +350,12 @@ en: | |||
|       week_interactions: interactions this week | ||||
|       week_users_active: active this week | ||||
|       week_users_new: users this week | ||||
|       whitelist_mode: Whitelist mode | ||||
|       whitelist_mode: Limited federation mode | ||||
|     domain_allows: | ||||
|       add_new: Whitelist domain | ||||
|       created_msg: Domain has been successfully whitelisted | ||||
|       destroyed_msg: Domain has been removed from the whitelist | ||||
|       undo: Remove from whitelist | ||||
|       add_new: Allow federation with domain | ||||
|       created_msg: Domain has been successfully allowed for federation | ||||
|       destroyed_msg: Domain has been disallowed from federation | ||||
|       undo: Disallow federation with domain | ||||
|     domain_blocks: | ||||
|       add_new: Add new domain block | ||||
|       created_msg: Domain block is now being processed | ||||
|  | @ -398,16 +398,16 @@ en: | |||
|       view: View domain block | ||||
|     email_domain_blocks: | ||||
|       add_new: Add new | ||||
|       created_msg: Successfully added e-mail domain to blacklist | ||||
|       created_msg: Successfully blocked e-mail domain | ||||
|       delete: Delete | ||||
|       destroyed_msg: Successfully deleted e-mail domain from blacklist | ||||
|       destroyed_msg: Successfully unblocked e-mail domain | ||||
|       domain: Domain | ||||
|       empty: No e-mail domains currently blacklisted. | ||||
|       empty: No e-mail domains currently blocked. | ||||
|       from_html: from %{domain} | ||||
|       new: | ||||
|         create: Add domain | ||||
|         title: New e-mail blacklist entry | ||||
|       title: E-mail blacklist | ||||
|         title: Block new e-mail domain | ||||
|       title: Blocked e-mail domains | ||||
|     instances: | ||||
|       by_domain: Domain | ||||
|       delivery_available: Delivery is available | ||||
|  | @ -451,7 +451,7 @@ en: | |||
|       pending: Waiting for relay's approval | ||||
|       save_and_enable: Save and enable | ||||
|       setup: Setup a relay connection | ||||
|       signatures_not_enabled: Relays will not work correctly while secure mode or whitelist mode is enabled | ||||
|       signatures_not_enabled: Relays will not work correctly while secure mode or limited federation mode is enabled | ||||
|       status: Status | ||||
|       title: Relays | ||||
|     report_notes: | ||||
|  |  | |||
|  | @ -16,22 +16,22 @@ module Mastodon | |||
|     option :concurrency, type: :numeric, default: 5, aliases: [:c] | ||||
|     option :verbose, type: :boolean, aliases: [:v] | ||||
|     option :dry_run, type: :boolean | ||||
|     option :whitelist_mode, type: :boolean | ||||
|     option :limited_federation_mode, type: :boolean | ||||
|     desc 'purge [DOMAIN...]', 'Remove accounts from a DOMAIN without a trace' | ||||
|     long_desc <<-LONG_DESC | ||||
|       Remove all accounts from a given DOMAIN without leaving behind any | ||||
|       records. Unlike a suspension, if the DOMAIN still exists in the wild, | ||||
|       it means the accounts could return if they are resolved again. | ||||
| 
 | ||||
|       When the --whitelist-mode option is given, instead of purging accounts | ||||
|       from a single domain, all accounts from domains that are not whitelisted | ||||
|       When the --limited-federation-mode option is given, instead of purging accounts | ||||
|       from a single domain, all accounts from domains that have not been explicitly allowed | ||||
|       are removed from the database. | ||||
|     LONG_DESC | ||||
|     def purge(*domains) | ||||
|       dry_run = options[:dry_run] ? ' (DRY RUN)' : '' | ||||
| 
 | ||||
|       scope = begin | ||||
|         if options[:whitelist_mode] | ||||
|         if options[:limited_federation_mode] | ||||
|           Account.remote.where.not(domain: DomainAllow.pluck(:domain)) | ||||
|         elsif !domains.empty? | ||||
|           Account.remote.where(domain: domains) | ||||
|  |  | |||
		Reference in a new issue