mirror of
				https://github.com/searxng/searxng.git
				synced 2025-10-30 18:22:31 -04:00 
			
		
		
		
	This patch was generated by black [1]::
    make format.python
[1] https://github.com/psf/black
Signed-off-by: Markus Heiser <markus.heiser@darmarit.de>
		
	
			
		
			
				
	
	
		
			73 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			73 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| # SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| # lint: pylint
 | |
| """Raise exception for an HTTP response is an error.
 | |
| 
 | |
| """
 | |
| 
 | |
| from searx.exceptions import (
 | |
|     SearxEngineCaptchaException,
 | |
|     SearxEngineTooManyRequestsException,
 | |
|     SearxEngineAccessDeniedException,
 | |
| )
 | |
| 
 | |
| 
 | |
| def is_cloudflare_challenge(resp):
 | |
|     if resp.status_code in [429, 503]:
 | |
|         if ('__cf_chl_jschl_tk__=' in resp.text) or (
 | |
|             '/cdn-cgi/challenge-platform/' in resp.text
 | |
|             and 'orchestrate/jsch/v1' in resp.text
 | |
|             and 'window._cf_chl_enter(' in resp.text
 | |
|         ):
 | |
|             return True
 | |
|     if resp.status_code == 403 and '__cf_chl_captcha_tk__=' in resp.text:
 | |
|         return True
 | |
|     return False
 | |
| 
 | |
| 
 | |
| def is_cloudflare_firewall(resp):
 | |
|     return resp.status_code == 403 and '<span class="cf-error-code">1020</span>' in resp.text
 | |
| 
 | |
| 
 | |
| def raise_for_cloudflare_captcha(resp):
 | |
|     if resp.headers.get('Server', '').startswith('cloudflare'):
 | |
|         if is_cloudflare_challenge(resp):
 | |
|             # https://support.cloudflare.com/hc/en-us/articles/200170136-Understanding-Cloudflare-Challenge-Passage-Captcha-
 | |
|             # suspend for 2 weeks
 | |
|             raise SearxEngineCaptchaException(message='Cloudflare CAPTCHA', suspended_time=3600 * 24 * 15)
 | |
| 
 | |
|         if is_cloudflare_firewall(resp):
 | |
|             raise SearxEngineAccessDeniedException(message='Cloudflare Firewall', suspended_time=3600 * 24)
 | |
| 
 | |
| 
 | |
| def raise_for_recaptcha(resp):
 | |
|     if resp.status_code == 503 and '"https://www.google.com/recaptcha/' in resp.text:
 | |
|         raise SearxEngineCaptchaException(message='ReCAPTCHA', suspended_time=3600 * 24 * 7)
 | |
| 
 | |
| 
 | |
| def raise_for_captcha(resp):
 | |
|     raise_for_cloudflare_captcha(resp)
 | |
|     raise_for_recaptcha(resp)
 | |
| 
 | |
| 
 | |
| def raise_for_httperror(resp):
 | |
|     """Raise exception for an HTTP response is an error.
 | |
| 
 | |
|     Args:
 | |
|         resp (requests.Response): Response to check
 | |
| 
 | |
|     Raises:
 | |
|         requests.HTTPError: raise by resp.raise_for_status()
 | |
|         searx.exceptions.SearxEngineAccessDeniedException: raise when the HTTP status code is 402 or 403.
 | |
|         searx.exceptions.SearxEngineTooManyRequestsException: raise when the HTTP status code is 429.
 | |
|         searx.exceptions.SearxEngineCaptchaException: raise when if CATPCHA challenge is detected.
 | |
|     """
 | |
|     if resp.status_code and resp.status_code >= 400:
 | |
|         raise_for_captcha(resp)
 | |
|         if resp.status_code in (402, 403):
 | |
|             raise SearxEngineAccessDeniedException(
 | |
|                 message='HTTP error ' + str(resp.status_code), suspended_time=3600 * 24
 | |
|             )
 | |
|         if resp.status_code == 429:
 | |
|             raise SearxEngineTooManyRequestsException()
 | |
|         resp.raise_for_status()
 |