mirror of
				https://github.com/searxng/searxng.git
				synced 2025-10-31 18:47:07 -04:00 
			
		
		
		
	For correct determination of the IP to the request the function botdetection.get_real_ip() is implemented. This fonction is used in the ip_limit and link_token method of the botdetection and it is used in the self_info plugin. A documentation about the X-Forwarded-For header has been added. [1] https://github.com/searxng/searxng/pull/2357#issuecomment-1566211059 Signed-off-by: Markus Heiser <markus.heiser@darmarit.de>
		
			
				
	
	
		
			31 lines
		
	
	
		
			940 B
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			31 lines
		
	
	
		
			940 B
		
	
	
	
		
			Python
		
	
	
	
	
	
| # SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| # lint: pylint
 | |
| # pylint: disable=missing-module-docstring,invalid-name
 | |
| 
 | |
| import re
 | |
| from flask_babel import gettext
 | |
| 
 | |
| from searx.botdetection._helpers import get_real_ip
 | |
| 
 | |
| name = gettext('Self Information')
 | |
| description = gettext('Displays your IP if the query is "ip" and your user agent if the query contains "user agent".')
 | |
| default_on = True
 | |
| preference_section = 'query'
 | |
| query_keywords = ['user-agent']
 | |
| query_examples = ''
 | |
| 
 | |
| # Self User Agent regex
 | |
| p = re.compile('.*user[ -]agent.*', re.IGNORECASE)
 | |
| 
 | |
| 
 | |
| def post_search(request, search):
 | |
|     if search.search_query.pageno > 1:
 | |
|         return True
 | |
|     if search.search_query.query == 'ip':
 | |
|         ip = get_real_ip(request)
 | |
|         search.result_container.answers['ip'] = {'answer': ip}
 | |
|     elif p.match(search.search_query.query):
 | |
|         ua = request.user_agent
 | |
|         search.result_container.answers['user-agent'] = {'answer': ua}
 | |
|     return True
 |