mirror of
https://github.com/PurpleI2P/i2pd-tools.git
synced 2025-01-22 13:27:17 +01:00
more
This commit is contained in:
parent
e5c253bd5e
commit
4c5c4c953c
|
@ -17,7 +17,7 @@ def main():
|
|||
|
||||
args = ap.parse_args()
|
||||
s = settings.load(args.settings)
|
||||
fmax = s.get("thresholds", "max_floodfills_per_ip", fallback=5)
|
||||
fmax = s.get("thresholds", "max_floodfills_per_ip", fallback=3)
|
||||
f = filter.FloodfillFilter(fmax)
|
||||
p = processor.BaddieProcessor([f])
|
||||
netdb.inspect(p.hook)
|
||||
|
|
29
baddiefinder/baddiefinder/web.py
Normal file
29
baddiefinder/baddiefinder/web.py
Normal file
|
@ -0,0 +1,29 @@
|
|||
import flask
|
||||
import io
|
||||
import netdb
|
||||
|
||||
from . import settings
|
||||
from . import filter
|
||||
from . import processor
|
||||
|
||||
app = flask.Flask(__name__)
|
||||
|
||||
@app.route("/baddies.txt")
|
||||
def baddies():
|
||||
s = settings.load('baddies.ini')
|
||||
fmax = s.get("thresholds", "max_floodfills_per_ip", fallback=3)
|
||||
f = filter.FloodfillFilter(fmax)
|
||||
p = processor.BaddieProcessor([f])
|
||||
path = s.get("netdb", "directory", fallback=None)
|
||||
if path:
|
||||
netdb.inspect(p.hook, path)
|
||||
else:
|
||||
netdb.inspect(p.hook)
|
||||
body = io.BytesIO()
|
||||
p.write_blocklist(body)
|
||||
return body
|
||||
|
||||
@app.route("/")
|
||||
def index():
|
||||
return """this server serves a router info blocklist of ip addresses with unreasonably high desnity of i2p routers (right now just floodfills)
|
||||
"""
|
|
@ -1,2 +1 @@
|
|||
python-geoip
|
||||
python-geoip-geolite2
|
||||
flask
|
||||
|
|
Loading…
Reference in a new issue