fix: migrate to malware-filter group

- BREAKING CHANGE
- gitlab.com/malware-filter/malware-filter
This commit is contained in:
MDLeom 2022-05-21 02:51:52 +00:00
parent f8178becdf
commit 10f500744f
No known key found for this signature in database
GPG Key ID: 32D3E28E96A695E8
4 changed files with 12 additions and 12 deletions

View File

@ -1,9 +1,9 @@
# Malicious URL Blocklist
> Announcement: curben.gitlab.io will be migrated to malware-filter.gitlab.io on 2022/05/21
> Announcement (2055/05/21): curben.gitlab.io has been migrated to malware-filter.gitlab.io
Blocklists mirror of [urlhaus-filter](https://gitlab.com/curben/urlhaus-filter), [phishing-filter](https://gitlab.com/curben/phishing-filter), [pup-filter](https://gitlab.com/curben/pup-filter) and [tracking-filter](https://gitlab.com/malware-filter/tracking-filter).
Blocklists mirror of [urlhaus-filter](https://gitlab.com/malware-filter/urlhaus-filter), [phishing-filter](https://gitlab.com/malware-filter/phishing-filter), [pup-filter](https://gitlab.com/malware-filter/pup-filter) and [tracking-filter](https://gitlab.com/malware-filter/tracking-filter).
## FAQ and Guides
See [wiki](https://gitlab.com/curben/malware-filter/-/wikis/home)
See [wiki](https://gitlab.com/malware-filter/malware-filter/-/wikis/home)

View File

@ -45,9 +45,9 @@ const pipelineStatus = async (url) => {
const dl = async (project) => {
const filename = project + '.zip'
const link = `https://gitlab.com/curben/${project}/-/jobs/artifacts/main/download?job=pages`
const link = `https://gitlab.com/malware-filter/${project}/-/jobs/artifacts/main/download?job=pages`
const zipPath = join(tmpPath, filename)
const pipelineUrl = `https://gitlab.com/curben/${project}/badges/main/pipeline.svg`
const pipelineUrl = `https://gitlab.com/malware-filter/${project}/badges/main/pipeline.svg`
let isMirror = false
console.log(`Downloading ${filename} from "${link}"`)
@ -115,7 +115,7 @@ const f = async () => {
const oisd = async () => {
await mkdir(publicPath, { recursive: true })
if (Object.prototype.hasOwnProperty.call(envVar, 'CI_PROJECT_PATH') && envVar.CI_PROJECT_PATH === 'curben/malware-filter') {
if (Object.prototype.hasOwnProperty.call(envVar, 'CI_PROJECT_PATH') && envVar.CI_PROJECT_PATH === 'malware-filter/malware-filter') {
await Promise.all(Object.entries(oisdFilters).map(([link, filename]) => { return oisdDl(link, filename) }))
}
}

View File

@ -1,7 +1,7 @@
#!/bin/sh
ARTIFACT_STATUS=$(curl -sSIL "https://gitlab.com/curben/urlhaus-filter/-/jobs/artifacts/main/download?job=pages" | grep -F "HTTP/2 200")
PIPELINE_STATUS=$(curl -sSL "https://gitlab.com/curben/urlhaus-filter/badges/main/pipeline.svg" | grep -F "failed")
ARTIFACT_STATUS=$(curl -sSIL "https://gitlab.com/malware-filter/urlhaus-filter/-/jobs/artifacts/main/download?job=pages" | grep -F "HTTP/2 200")
PIPELINE_STATUS=$(curl -sSL "https://gitlab.com/malware-filter/urlhaus-filter/badges/main/pipeline.svg" | grep -F "failed")
GITLAB_STATUS="up"
if [ -z "$ARTIFACT_STATUS" ] || [ -n "$PIPELINE_STATUS" ]; then

View File

@ -14,11 +14,11 @@ alias unzip="unzip -jo"
mkdir "tmp/"
cd "tmp/"
curl "https://gitlab.com/curben/urlhaus-filter/-/jobs/artifacts/main/download?job=pages" -o "urlhaus-filter.zip"
curl "https://gitlab.com/curben/phishing-filter/-/jobs/artifacts/main/download?job=pages" -o "phishing-filter.zip"
curl "https://gitlab.com/curben/pup-filter/-/jobs/artifacts/main/download?job=pages" -o "pup-filter.zip"
curl "https://gitlab.com/malware-filter/urlhaus-filter/-/jobs/artifacts/main/download?job=pages" -o "urlhaus-filter.zip"
curl "https://gitlab.com/malware-filter/phishing-filter/-/jobs/artifacts/main/download?job=pages" -o "phishing-filter.zip"
curl "https://gitlab.com/malware-filter/pup-filter/-/jobs/artifacts/main/download?job=pages" -o "pup-filter.zip"
curl "https://gitlab.com/malware-filter/tracking-filter/-/jobs/artifacts/main/download?job=pages" -o "tracking-filter.zip"
curl "https://gitlab.com/curben/vn-badsite-filter/-/jobs/artifacts/main/download?job=pages" -o "vn-badsite-filter.zip"
curl "https://gitlab.com/malware-filter/vn-badsite-filter/-/jobs/artifacts/main/download?job=pages" -o "vn-badsite-filter.zip"
for zipfile in $(find . -name "*.zip" -type f)
do