mirror of
https://github.com/searxng/searxng
synced 2024-10-30 21:20:28 +00:00
38431d2e14
For correct determination of the IP to the request the function botdetection.get_real_ip() is implemented. This fonction is used in the ip_limit and link_token method of the botdetection and it is used in the self_info plugin. A documentation about the X-Forwarded-For header has been added. [1] https://github.com/searxng/searxng/pull/2357#issuecomment-1566211059 Signed-off-by: Markus Heiser <markus.heiser@darmarit.de>
31 lines
940 B
Python
31 lines
940 B
Python
# SPDX-License-Identifier: AGPL-3.0-or-later
|
|
# lint: pylint
|
|
# pylint: disable=missing-module-docstring,invalid-name
|
|
|
|
import re
|
|
from flask_babel import gettext
|
|
|
|
from searx.botdetection._helpers import get_real_ip
|
|
|
|
name = gettext('Self Information')
|
|
description = gettext('Displays your IP if the query is "ip" and your user agent if the query contains "user agent".')
|
|
default_on = True
|
|
preference_section = 'query'
|
|
query_keywords = ['user-agent']
|
|
query_examples = ''
|
|
|
|
# Self User Agent regex
|
|
p = re.compile('.*user[ -]agent.*', re.IGNORECASE)
|
|
|
|
|
|
def post_search(request, search):
|
|
if search.search_query.pageno > 1:
|
|
return True
|
|
if search.search_query.query == 'ip':
|
|
ip = get_real_ip(request)
|
|
search.result_container.answers['ip'] = {'answer': ip}
|
|
elif p.match(search.search_query.query):
|
|
ua = request.user_agent
|
|
search.result_container.answers['user-agent'] = {'answer': ua}
|
|
return True
|