elif block["blocked"].endswith(".tld"):
logger.debug("blocked='%s' is a fake domain - SKIPPED", block["blocked"])
continue
- elif "xn--" in block["blocked"]:
- raise ValueError(f"blocked='{block['blocked']}' is a punycode domain, please don't crawl them!")
elif block["blocked"].find("*") >= 0:
logger.debug("blocker='%s' uses obfuscated domains", blocker)
elif domain.endswith(".tld"):
logger.debug("domain='%s' is a fake domain - SKIPPED", domain)
continue
- elif "xn--" in domain:
- raise ValueError(f"domain='{domain}' is a punycode domain, please translate them back!")
elif domain.find("*") >= 0 or domain.find("?") >= 0:
logger.debug("domain='%s' is obfuscated - Invoking utils.deobfuscate(%s, %s) ...", domain, domain, block["blocker"])
domain = utils.deobfuscate(domain, block["blocker"])
elif block["blocked"].endswith(".tld"):
logger.debug("blocked='%s' is a fake domain name - SKIPPED!", block["blocked"])
continue
- elif "xn--" in block["blocked"]:
- raise ValueError(f"blocked='{block['blocked']}' is a punycode domain, please translate them back!")
elif block["blocked"].endswith(".onion"):
logger.debug("blocked='%s' is a TOR onion domain name - SKIPPED!", block["blocked"])
continue
raise ValueError(f"domain='{domain}' is a TOR, please don't crawl them!")
elif domain.endswith(".tld"):
raise ValueError(f"domain='{domain}' is a fake domain, please don't crawl them!")
- elif "xn--" in domain:
- raise ValueError(f"domain='{domain}' is a punycode domain, please don't crawl them!")
logger.debug("EXIT!")
elif domain.endswith(".tld"):
logger.debug("domain='%s' is a fake domain - settings False ...", domain)
wanted = False
- elif "xn--" in domain:
- raise ValueError(f"domain='{domain}' is a punycode domain, please don't crawl them!")
elif blacklist.is_blacklisted(domain):
logger.debug("domain='%s' is blacklisted - settings False ...", domain)
wanted = False