diff options
author | William Heimbigner <william.heimbigner@gmail.com> | 2016-01-21 17:26:24 -0700 |
---|---|---|
committer | William Heimbigner <william.heimbigner@gmail.com> | 2016-01-21 17:26:24 -0700 |
commit | 24ee93be35413ac72570f79762ffe9e8f3db7463 (patch) | |
tree | 5f06646360e5eb80ee25c88cfe4dd81904300534 | |
parent | a73ccb8276861dab3fcba34c2783122655947844 (diff) | |
download | antispammeta-24ee93be35413ac72570f79762ffe9e8f3db7463.tar.bz2 antispammeta-24ee93be35413ac72570f79762ffe9e8f3db7463.tar.xz antispammeta-24ee93be35413ac72570f79762ffe9e8f3db7463.tar.zst |
Shorten the URL provided via ;investigate
-rw-r--r-- | lib/ASM/Commander.pm | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/lib/ASM/Commander.pm b/lib/ASM/Commander.pm index 0098d32..2f76c91 100644 --- a/lib/ASM/Commander.pm +++ b/lib/ASM/Commander.pm @@ -468,11 +468,11 @@ sub cmd_investigate { $dq = join '.', unpack 'C4', pack 'N', $ip; } $conn->privmsg($event->replyto, "I found $mnicks matches by nick ($nick), $musers by user ($person->{user}), $mhosts by hostname ($person->{host}), " . - "$maccts by NickServ account ($person->{account}), $mgecos by gecos field ($person->{gecos}), and $matchedip by real IP ($dq)."); - $conn->privmsg($event->replyto, 'Web results are at https://antispammeta.net/cgi-bin/secret/investigate.pl?nick=' . uri_escape($nick) . + "$maccts by NickServ account ($person->{account}), $mgecos by gecos field ($person->{gecos}), and $matchedip by real IP ($dq). " . + ASM::Shortener->shorturl('https://antispammeta.net/cgi-bin/secret/investigate.pl?nick=' . uri_escape($nick) . ((lc $person->{user} ~~ $::mysql->{ignoredidents}) ? '' : '&user=' . uri_escape($person->{user})) . '&host=' . uri_escape($person->{host}) . '&account=' . uri_escape($person->{account}) . - ((lc $person->{gecos} ~~ $::mysql->{ignoredgecos}) ? '' : '&gecos=' . uri_escape($person->{gecos})) . '&realip=' . $dq); + ((lc $person->{gecos} ~~ $::mysql->{ignoredgecos}) ? '' : '&gecos=' . uri_escape($person->{gecos})) . '&realip=' . $dq)); } sub cmd_investigate2 { |