67 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
		
		
			
		
	
	
			67 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
|  | # SPDX-License-Identifier: AGPL-3.0-or-later | ||
|  | """
 | ||
|  | Raise exception for an HTTP response is an error. | ||
|  | """
 | ||
|  | from searx.exceptions import (SearxEngineCaptchaException, SearxEngineTooManyRequestsException, | ||
|  |                               SearxEngineAccessDeniedException) | ||
|  | 
 | ||
|  | 
 | ||
|  | def is_cloudflare_challenge(resp): | ||
|  |     if resp.status_code in [429, 503]: | ||
|  |         if ('__cf_chl_jschl_tk__=' in resp.text)\ | ||
|  |            or ('/cdn-cgi/challenge-platform/' in resp.text | ||
|  |                and 'orchestrate/jsch/v1' in resp.text | ||
|  |                and 'window._cf_chl_enter(' in resp.text): | ||
|  |             return True | ||
|  |     if resp.status_code == 403 and '__cf_chl_captcha_tk__=' in resp.text: | ||
|  |         return True | ||
|  |     return False | ||
|  | 
 | ||
|  | 
 | ||
|  | def is_cloudflare_firewall(resp): | ||
|  |     return resp.status_code == 403 and '<span class="cf-error-code">1020</span>' in resp.text | ||
|  | 
 | ||
|  | 
 | ||
|  | def raise_for_cloudflare_captcha(resp): | ||
|  |     if resp.headers.get('Server', '').startswith('cloudflare'): | ||
|  |         if is_cloudflare_challenge(resp): | ||
|  |             # https://support.cloudflare.com/hc/en-us/articles/200170136-Understanding-Cloudflare-Challenge-Passage-Captcha- | ||
|  |             # suspend for 2 weeks | ||
|  |             raise SearxEngineCaptchaException(message='Cloudflare CAPTCHA', suspended_time=3600 * 24 * 15) | ||
|  | 
 | ||
|  |         if is_cloudflare_firewall(resp): | ||
|  |             raise SearxEngineAccessDeniedException(message='Cloudflare Firewall', suspended_time=3600 * 24) | ||
|  | 
 | ||
|  | 
 | ||
|  | def raise_for_recaptcha(resp): | ||
|  |     if resp.status_code == 503 \ | ||
|  |        and '"https://www.google.com/recaptcha/' in resp.text: | ||
|  |         raise SearxEngineCaptchaException(message='ReCAPTCHA', suspended_time=3600 * 24 * 7) | ||
|  | 
 | ||
|  | 
 | ||
|  | def raise_for_captcha(resp): | ||
|  |     raise_for_cloudflare_captcha(resp) | ||
|  |     raise_for_recaptcha(resp) | ||
|  | 
 | ||
|  | 
 | ||
|  | def raise_for_httperror(resp): | ||
|  |     """Raise exception for an HTTP response is an error.
 | ||
|  | 
 | ||
|  |     Args: | ||
|  |         resp (requests.Response): Response to check | ||
|  | 
 | ||
|  |     Raises: | ||
|  |         requests.HTTPError: raise by resp.raise_for_status() | ||
|  |         searx.exceptions.SearxEngineAccessDeniedException: raise when the HTTP status code is 402 or 403. | ||
|  |         searx.exceptions.SearxEngineTooManyRequestsException: raise when the HTTP status code is 429. | ||
|  |         searx.exceptions.SearxEngineCaptchaException: raise when if CATPCHA challenge is detected. | ||
|  |     """
 | ||
|  |     if resp.status_code and resp.status_code >= 400: | ||
|  |         raise_for_captcha(resp) | ||
|  |         if resp.status_code in (402, 403): | ||
|  |             raise SearxEngineAccessDeniedException(message='HTTP error ' + str(resp.status_code), | ||
|  |                                                    suspended_time=3600 * 24) | ||
|  |         if resp.status_code == 429: | ||
|  |             raise SearxEngineTooManyRequestsException() | ||
|  |         resp.raise_for_status() |