if records is None:
logger.warning("Cannot deobfuscate block[blocked]='%s',row[domain]='%s',row[software]='%s' - SKIPPED!", block["blocked"], row["domain"], row["software"])
- if not obfuscation.is_added(block["blocked"]):
+ if not obfuscation.has(block["blocked"]):
logger.debug("Invoking obfuscation.add(%s) ...", block["blocked"])
obfuscation.add(block["blocked"])
else:
if records is None:
logger.warning("Cannot deobfuscate block[blocked]='%s',row[domain]='%s',row[software]='%s' - SKIPPED!", block["blocked"], row["domain"], row["software"])
- if not obfuscation.is_added(block["blocked"]):
+ if not obfuscation.has(block["blocked"]):
logger.debug("Invoking obfuscation.add(%s) ...", block["blocked"])
obfuscation.add(block["blocked"])
else:
elif blocks.is_instance_blocked(row["domain"], blocked):
logger.debug("blocked='%s' is already blocked by domain='%s' - SKIPPED!", blocked, row["domain"])
continue
- elif obfuscation.is_added(block["blocked"]):
+ elif obfuscation.has(block["blocked"]):
logger.debug("Deleting deobfuscated pattern block[blocked]='%s' ...", block["blocked"])
obfuscation.delete(block["blocked"])
})
elif blocked is not None:
logger.debug("blocked='%s' is maybe added and needs update.", blocked)
- if not obfuscation.is_added(block["blocked"]):
+ if not obfuscation.has(block["blocked"]):
logger.debug("Invoking obfuscation.add(%s) ...", block["blocked"])
obfuscation.add(block["blocked"])
else:
logger = logging.getLogger(__name__)
#logger.setLevel(logging.DEBUG)
-def is_added(pattern: str) -> bool:
+def has(pattern: str) -> bool:
logger.debug("pattern='%s' - CALLED!", pattern)
if not isinstance(pattern, str):
raise ValueError(f"pattern[]='{type(pattern)}' is not of type 'str'")
raise ValueError(f"pattern[]='{type(pattern)}' is not of type 'str'")
elif pattern == "":
raise ValueError("Parametern 'pattern' is an empty string")
- elif is_added(pattern):
+ elif has(pattern):
raise Exception(f"pattern='{pattern}' is already added but function was invoked")
database.cursor.execute("INSERT INTO obfuscation (pattern, added) VALUES (?, ?)", (
raise ValueError(f"pattern[]='{type(pattern)}' is not of type 'str'")
elif pattern == "":
raise ValueError("Parametern 'pattern' is an empty string")
- elif not is_added(pattern):
+ elif not has(pattern):
raise Exception(f"pattern='{pattern}' is not added but function was invoked")
database.cursor.execute("UPDATE obfuscation SET last_used=? WHERE pattern=? LIMIT 1", (
raise ValueError(f"pattern[]='{type(pattern)}' is not of type 'str'")
elif pattern == "":
raise ValueError("Parametern 'pattern' is an empty string")
- elif not is_added(pattern):
+ elif not has(pattern):
raise Exception(f"pattern='{pattern}' is not added but function was invoked")
database.cursor.execute("DELETE FROM obfuscation WHERE pattern=? LIMIT 1", [pattern])
"reason" : None,
"block_level": block_level,
})
-
else:
logger.warning("Cannot find 'mrf_simple' or 'quarantined_instances' in JSON reply: domain='%s'", domain)
)
logger.debug("response.ok='%s',response.status_code=%d,response.text()=%d", response.ok, response.status_code, len(response.text))
- if not response.ok or response.text.strip() == "":
+ if not response.ok or response.status_code >= 400 or response.text.strip() == "":
logger.warning("path='%s' does not exist on domain='%s' - SKIPPED!", path, domain)
continue