# Invoke other function, avoid trailing ?
logger.debug("components[%s]='%s'", type(components), components)
if components.query != "":
- response = network.fetch_response(components.netloc, f"{components.path}?{components.query}", headers, timeout)
+ response = network.fetch_response(components.netloc.split(":")[0], f"{components.path}?{components.query}", headers, timeout)
else:
- response = network.fetch_response(components.netloc, components.path if isinstance(components.path, str) and components.path != '' else '/', headers, timeout)
+ response = network.fetch_response(components.netloc.split(":")[0], components.path if isinstance(components.path, str) and components.path != '' else '/', headers, timeout)
logger.debug("response[]='%s' - EXIT!", type(response))
return response
if domain.find("*") >= 0:
logger.debug("blocker='%s' uses obfuscated domains", blocker)
+ instances.set_has_obfuscation(blocker, True)
# Obscured domain name with no hash
row = instances.deobfuscate("*", domain, domain_hash)
domain = row["domain"]
else:
logger.warning("blocker='%s' has domain='%s' that cannot be deobfuscated.", blocker, domain)
- instances.set_has_obfuscation(blocker, True)
elif domain.find("?") >= 0:
logger.debug("blocker='%s' uses obfuscated domains", blocker)
+ instances.set_has_obfuscation(blocker, True)
# Obscured domain name with no hash
row = instances.deobfuscate("?", domain, domain_hash)
domain = row["domain"]
else:
logger.warning("blocker='%s' has domain='%s' that cannot be deobfuscated.", blocker, domain)
- instances.set_has_obfuscation(blocker, True)
else:
logger.debug("domain='%s' is not obfuscated", domain)