+
+def fetch_blocks(domain: str) -> list:
+ logger.debug("domain='%s' - CALLED!", domain)
+ domain_helper.raise_on(domain)
+
+ if not instances.is_registered(domain):
+ raise Exception(f"domain='{domain}' is not registered but function is invoked.")
+
+ # Init block list
+ blocklist = list()
+
+ # No CSRF by default, you don't have to add network.api_headers by yourself here
+ headers = tuple()
+
+ try:
+ logger.debug("Checking CSRF for domain='%s'", domain)
+ headers = csrf.determine(domain, dict())
+ except network.exceptions as exception:
+ logger.warning("Exception '%s' during checking CSRF (fetch_blocks,%s)", type(exception), __name__)
+ instances.set_last_error(domain, exception)
+
+ logger.debug("Returning empty list ... - EXIT!")
+ return list()
+
+ try:
+ # json endpoint for newer mastodongs
+ logger.info("Fetching domain_blocks from domain='%s' ...", domain)
+ data = network.get_json_api(
+ domain,
+ "/api/v1/instance/domain_blocks",
+ headers,
+ (config.get("connection_timeout"), config.get("read_timeout"))
+ )
+ rows = list()
+
+ logger.debug("data[]='%s'", type(data))
+ if "error_message" in data:
+ logger.debug("Was not able to fetch domain_blocks from domain='%s': status_code=%d,error_message='%s'", domain, data['status_code'], data['error_message'])
+ instances.set_last_error(domain, data)
+ return blocklist
+ elif "json" in data and "error" in data["json"]:
+ logger.warning("JSON API returned error message: '%s'", data["json"]["error"])
+ instances.set_last_error(domain, data)
+ return blocklist
+ else:
+ # Getting blocklist
+ rows = data["json"]
+
+ logger.debug("Marking domain='%s' as successfully handled ...", domain)
+ instances.set_success(domain)
+
+ logger.debug("rows[%s]()=%d", type(rows), len(rows))
+ if len(rows) > 0:
+ logger.debug("Checking %d entries from domain='%s' ...", len(rows), domain)
+ for block in rows:
+ # Check type
+ logger.debug("block[]='%s'", type(block))
+ if not isinstance(block, dict):
+ logger.debug("block[]='%s' is of type 'dict' - SKIPPED!", type(block))
+ continue
+ elif "domain" not in block:
+ logger.warning("block()=%d does not contain element 'domain' - SKIPPED!", len(block))
+ continue
+ elif "severity" not in block:
+ logger.warning("block()=%d does not contain element 'severity' - SKIPPED!", len(block))
+ continue
+ elif block["severity"] in ["accept", "accepted"]:
+ logger.debug("block[domain]='%s' has unwanted severity level '%s' - SKIPPED!", block["domain"], block["severity"])
+ continue
+ elif "digest" in block and not validators.hashes.sha256(block["digest"]):
+ logger.warning("block[domain]='%s' has invalid block[digest]='%s' - SKIPPED!", block["domain"], block["digest"])
+ continue
+
+ reason = tidyup.reason(block["comment"]) if "comment" in block and block["comment"] is not None and block["comment"] != "" else None
+
+ logger.debug("Appending blocker='%s',blocked='%s',reason='%s',block_level='%s'", domain, block["domain"], reason, block["severity"])
+ blocklist.append({
+ "blocker" : domain,
+ "blocked" : block["domain"],
+ "digest" : block["digest"] if "digest" in block else None,
+ "reason" : reason,
+ "block_level": blocks.alias_block_level(block["severity"]),
+ })
+ else:
+ logger.debug("domain='%s' has no block list", domain)
+
+ except network.exceptions as exception:
+ logger.warning("domain='%s',exception[%s]='%s'", domain, type(exception), str(exception))
+ instances.set_last_error(domain, exception)
+
+ logger.debug("blocklist()=%d - EXIT!", len(blocklist))
+ return blocklist