logger.debug("blocked='%s' is a fake domain - SKIPPED", block["blocked"])
continue
elif block["blocked"].find("*") >= 0:
- logger.debug("blocker='%s' uses obfuscated domains, marking ...", blocker)
- instances.set_has_obfuscation(blocker, True)
+ logger.debug("blocker='%s' uses obfuscated domains", blocker)
# Some friendica servers also obscure domains without hash
row = instances.deobfuscate("*", block["blocked"], block["hash"] if "hash" in block else None)
logger.debug("row[]='%s'", type(row))
if row is None:
logger.warning("Cannot deobfuscate blocked='%s',blocker='%s',software='%s' - SKIPPED!", block["blocked"], blocker, software)
+ instances.set_has_obfuscation(blocker, True)
continue
block["blocked"] = row[0]
origin = row[1]
nodeinfo_url = row[2]
elif block["blocked"].find("?") >= 0:
- logger.debug("blocker='%s' uses obfuscated domains, marking ...", blocker)
- instances.set_has_obfuscation(blocker, True)
+ logger.debug("blocker='%s' uses obfuscated domains", blocker)
# Some obscure them with question marks, not sure if that's dependent on version or not
row = instances.deobfuscate("?", block["blocked"], block["hash"] if "hash" in block else None)
logger.debug("row[]='%s'", type(row))
if row is None:
logger.warning("Cannot deobfuscate blocked='%s',blocker='%s',software='%s' - SKIPPED!", block["blocked"], blocker, software)
+ instances.set_has_obfuscation(blocker, True)
continue
block["blocked"] = row[0]
raise ValueError(f"Parameter domain_hash[]='{type(domain_hash)}' is not of type 'str'")
if domain.find("*") >= 0:
- logger.debug("blocker='%s' uses obfuscated domains, marking ...", blocker)
- instances.set_has_obfuscation(blocker, True)
+ logger.debug("blocker='%s' uses obfuscated domains", blocker)
# Obscured domain name with no hash
row = instances.deobfuscate("*", domain, domain_hash)
if row is not None:
logger.debug("domain='%s' de-obscured to '%s'", domain, row[0])
domain = row[0]
+ else:
+ logger.debug("blocker='%s' has domain that cannot be deobfuscated.", blocker)
+ instances.set_has_obfuscation(blocker, True)
elif domain.find("?") >= 0:
- logger.debug("blocker='%s' uses obfuscated domains, marking ...", blocker)
- instances.set_has_obfuscation(blocker, True)
+ logger.debug("blocker='%s' uses obfuscated domains", blocker)
# Obscured domain name with no hash
row = instances.deobfuscate("?", domain, domain_hash)
if row is not None:
logger.debug("domain='%s' de-obscured to '%s'", domain, row[0])
domain = row[0]
+ else:
+ logger.debug("blocker='%s' has domain that cannot be deobfuscated.", blocker)
+ instances.set_has_obfuscation(blocker, True)
else:
logger.debug("domain='%s' is not obfuscated", domain)