1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
|
# == Schema Information
#
# Table name: censor_rules
#
# id :integer not null, primary key
# info_request_id :integer
# user_id :integer
# public_body_id :integer
# text :text not null
# replacement :text not null
# last_edit_editor :string(255) not null
# last_edit_comment :text not null
# created_at :datetime not null
# updated_at :datetime not null
# regexp :boolean
#
# models/censor_rule.rb:
# Stores alterations to remove specific data from requests.
#
# Copyright (c) 2008 UK Citizens Online Democracy. All rights reserved.
# Email: hello@mysociety.org; WWW: http://www.mysociety.org/
class CensorRule < ActiveRecord::Base
belongs_to :info_request
belongs_to :user
belongs_to :public_body
# a flag to allow the require_user_request_or_public_body
# validation to be skipped
attr_accessor :allow_global
validate :require_user_request_or_public_body, :unless => proc { |rule| rule.allow_global == true }
validate :require_valid_regexp, :if => proc { |rule| rule.regexp? == true }
validates_presence_of :text,
:replacement,
:last_edit_comment,
:last_edit_editor
scope :global, { :conditions => { :info_request_id => nil,
:user_id => nil,
:public_body_id => nil } }
def apply_to_text!(text_to_censor)
return nil if text_to_censor.nil?
text_to_censor.gsub!(to_replace, replacement)
end
def apply_to_binary!(binary_to_censor)
return nil if binary_to_censor.nil?
binary_to_censor.gsub!(to_replace) { |match| match.gsub(/./, 'x') }
end
def for_admin_column
self.class.content_columns.each do |column|
yield(column.human_name, send(column.name), column.type.to_s, column.name)
end
end
def is_global?
info_request_id.nil? && user_id.nil? && public_body_id.nil?
end
private
def require_user_request_or_public_body
if info_request.nil? && user.nil? && public_body.nil?
[:info_request, :user, :public_body].each do |a|
errors.add(a, "Rule must apply to an info request, a user or a body")
end
end
end
def require_valid_regexp
begin
make_regexp
rescue RegexpError => e
errors.add(:text, e.message)
end
end
def make_regexp
Regexp.new(text, Regexp::MULTILINE)
end
def to_replace
regexp? ? make_regexp : text
end
end
|