summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLibravatarWilliam Heimbigner <william.heimbigner@gmail.com>2016-01-21 17:26:24 -0700
committerLibravatarWilliam Heimbigner <william.heimbigner@gmail.com>2016-01-21 17:26:24 -0700
commit24ee93be35413ac72570f79762ffe9e8f3db7463 (patch)
tree5f06646360e5eb80ee25c88cfe4dd81904300534
parenta73ccb8276861dab3fcba34c2783122655947844 (diff)
downloadantispammeta-24ee93be35413ac72570f79762ffe9e8f3db7463.tar.bz2
antispammeta-24ee93be35413ac72570f79762ffe9e8f3db7463.tar.xz
antispammeta-24ee93be35413ac72570f79762ffe9e8f3db7463.tar.zst
Shorten the URL provided via ;investigate
-rw-r--r--lib/ASM/Commander.pm6
1 files changed, 3 insertions, 3 deletions
diff --git a/lib/ASM/Commander.pm b/lib/ASM/Commander.pm
index 0098d32..2f76c91 100644
--- a/lib/ASM/Commander.pm
+++ b/lib/ASM/Commander.pm
@@ -468,11 +468,11 @@ sub cmd_investigate {
$dq = join '.', unpack 'C4', pack 'N', $ip;
}
$conn->privmsg($event->replyto, "I found $mnicks matches by nick ($nick), $musers by user ($person->{user}), $mhosts by hostname ($person->{host}), " .
- "$maccts by NickServ account ($person->{account}), $mgecos by gecos field ($person->{gecos}), and $matchedip by real IP ($dq).");
- $conn->privmsg($event->replyto, 'Web results are at https://antispammeta.net/cgi-bin/secret/investigate.pl?nick=' . uri_escape($nick) .
+ "$maccts by NickServ account ($person->{account}), $mgecos by gecos field ($person->{gecos}), and $matchedip by real IP ($dq). " .
+ ASM::Shortener->shorturl('https://antispammeta.net/cgi-bin/secret/investigate.pl?nick=' . uri_escape($nick) .
((lc $person->{user} ~~ $::mysql->{ignoredidents}) ? '' : '&user=' . uri_escape($person->{user})) .
'&host=' . uri_escape($person->{host}) . '&account=' . uri_escape($person->{account}) .
- ((lc $person->{gecos} ~~ $::mysql->{ignoredgecos}) ? '' : '&gecos=' . uri_escape($person->{gecos})) . '&realip=' . $dq);
+ ((lc $person->{gecos} ~~ $::mysql->{ignoredgecos}) ? '' : '&gecos=' . uri_escape($person->{gecos})) . '&realip=' . $dq));
}
sub cmd_investigate2 {