2020-06-02 21:54:47 +03:00
|
|
|
from app.filter import Filter, get_first_link
|
2021-04-01 07:23:30 +03:00
|
|
|
from app.utils.session import generate_user_key
|
2020-06-02 21:54:47 +03:00
|
|
|
from app.request import gen_query
|
2020-12-18 00:06:47 +03:00
|
|
|
from bs4 import BeautifulSoup as bsoup
|
2020-06-02 21:54:47 +03:00
|
|
|
from cryptography.fernet import Fernet, InvalidToken
|
|
|
|
from flask import g
|
|
|
|
from typing import Any, Tuple
|
2021-01-23 22:50:30 +03:00
|
|
|
import os
|
2020-06-02 21:54:47 +03:00
|
|
|
|
Add tor and http/socks proxy support (#137)
* Add tor and http/socks proxy support
Allows users to enable/disable tor from the config menu, which will
forward all requests through Tor.
Also adds support for setting environment variables for alternative
proxy support. Setting the following variables will forward requests
through the proxy:
- WHOOGLE_PROXY_USER (optional)
- WHOOGLE_PROXY_PASS (optional)
- WHOOGLE_PROXY_TYPE (required)
- Can be "http", "socks4", or "socks5"
- WHOOGLE_PROXY_LOC (required)
- Format: "<ip address>:<port>"
See #30
* Refactor acquire_tor_conn -> acquire_tor_identity
Also updated travis CI to set up tor
* Add check for Tor socket on init, improve Tor error handling
Initializing the app sends a heartbeat request to Tor to check for
availability, and updates the home page config options accordingly. This
heartbeat is sent on every request, to ensure Tor support can be
reconfigured without restarting the entire app.
If Tor support is enabled, and a subsequent request fails, then a new
TorError exception is raised, and the Tor feature is disabled until a
valid connection is restored.
The max attempts has been updated to 10, since 5 seemed a bit too low
for how quickly the attempts go by.
* Change send_tor_signal arg type, update function doc
send_tor_signal now accepts a stem.Signal arg (a bit cleaner tbh). Also
added the doc string for the "disable" attribute in TorError.
* Fix tor identity logic in Request.send
* Update proxy init, change proxyloc var name
Proxy is now only initialized if both type and location are specified,
as neither have a default fallback and both are required. I suppose the
type could fall back to http, but seems safer this way.
Also refactored proxyurl -> proxyloc for the runtime args in order to
match the Dockerfile args.
* Add tor/proxy support for Docker builds, fix opensearch/init
The Dockerfile is now updated to include support for Tor configuration,
with a working torrc file included in the repo.
An issue with opensearch was fixed as well, which was uncovered during
testing and was simple enough to fix here. Likewise, DDG bang gen was
updated to only ever happen if the file didn't exist previously, as
testing with the file being regenerated every time was tedious.
* Add missing "@" for socks proxy requests
2020-10-29 03:47:42 +03:00
|
|
|
TOR_BANNER = '<hr><h1 style="text-align: center">You are using Tor</h1><hr>'
|
2021-03-21 04:51:24 +03:00
|
|
|
CAPTCHA = 'div class="g-recaptcha"'
|
Add tor and http/socks proxy support (#137)
* Add tor and http/socks proxy support
Allows users to enable/disable tor from the config menu, which will
forward all requests through Tor.
Also adds support for setting environment variables for alternative
proxy support. Setting the following variables will forward requests
through the proxy:
- WHOOGLE_PROXY_USER (optional)
- WHOOGLE_PROXY_PASS (optional)
- WHOOGLE_PROXY_TYPE (required)
- Can be "http", "socks4", or "socks5"
- WHOOGLE_PROXY_LOC (required)
- Format: "<ip address>:<port>"
See #30
* Refactor acquire_tor_conn -> acquire_tor_identity
Also updated travis CI to set up tor
* Add check for Tor socket on init, improve Tor error handling
Initializing the app sends a heartbeat request to Tor to check for
availability, and updates the home page config options accordingly. This
heartbeat is sent on every request, to ensure Tor support can be
reconfigured without restarting the entire app.
If Tor support is enabled, and a subsequent request fails, then a new
TorError exception is raised, and the Tor feature is disabled until a
valid connection is restored.
The max attempts has been updated to 10, since 5 seemed a bit too low
for how quickly the attempts go by.
* Change send_tor_signal arg type, update function doc
send_tor_signal now accepts a stem.Signal arg (a bit cleaner tbh). Also
added the doc string for the "disable" attribute in TorError.
* Fix tor identity logic in Request.send
* Update proxy init, change proxyloc var name
Proxy is now only initialized if both type and location are specified,
as neither have a default fallback and both are required. I suppose the
type could fall back to http, but seems safer this way.
Also refactored proxyurl -> proxyloc for the runtime args in order to
match the Dockerfile args.
* Add tor/proxy support for Docker builds, fix opensearch/init
The Dockerfile is now updated to include support for Tor configuration,
with a working torrc file included in the repo.
An issue with opensearch was fixed as well, which was uncovered during
testing and was simple enough to fix here. Likewise, DDG bang gen was
updated to only ever happen if the file didn't exist previously, as
testing with the file being regenerated every time was tedious.
* Add missing "@" for socks proxy requests
2020-10-29 03:47:42 +03:00
|
|
|
|
|
|
|
|
2021-01-23 22:50:30 +03:00
|
|
|
def needs_https(url: str) -> bool:
|
2021-03-08 20:22:04 +03:00
|
|
|
"""Checks if the current instance needs to be upgraded to HTTPS
|
|
|
|
|
|
|
|
Note that all Heroku instances are available by default over HTTPS, but
|
|
|
|
do not automatically set up a redirect when visited over HTTP.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
url: The instance url
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
bool: True/False representing the need to upgrade
|
|
|
|
|
|
|
|
"""
|
2021-03-24 22:13:52 +03:00
|
|
|
https_only = bool(os.getenv('HTTPS_ONLY', 0))
|
2021-04-01 17:21:59 +03:00
|
|
|
is_heroku = url.endswith('.herokuapp.com')
|
2021-01-23 22:50:30 +03:00
|
|
|
is_http = url.startswith('http://')
|
|
|
|
|
|
|
|
return (is_heroku and is_http) or (https_only and is_http)
|
|
|
|
|
|
|
|
|
2021-03-24 22:13:52 +03:00
|
|
|
def has_captcha(results: str) -> bool:
|
|
|
|
"""Checks to see if the search results are blocked by a captcha
|
|
|
|
|
|
|
|
Args:
|
|
|
|
results: The search page html as a string
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
bool: True/False indicating if a captcha element was found
|
|
|
|
|
|
|
|
"""
|
|
|
|
return CAPTCHA in results
|
2021-03-21 04:51:24 +03:00
|
|
|
|
|
|
|
|
2021-03-08 20:22:04 +03:00
|
|
|
class Search:
|
|
|
|
"""Search query preprocessor - used before submitting the query or
|
|
|
|
redirecting to another site
|
|
|
|
|
|
|
|
Attributes:
|
|
|
|
request: the incoming flask request
|
|
|
|
config: the current user config settings
|
|
|
|
session: the flask user session
|
|
|
|
"""
|
2020-06-06 00:24:44 +03:00
|
|
|
def __init__(self, request, config, session, cookies_disabled=False):
|
2020-12-18 00:06:47 +03:00
|
|
|
method = request.method
|
|
|
|
self.request_params = request.args if method == 'GET' else request.form
|
2020-06-02 21:54:47 +03:00
|
|
|
self.user_agent = request.headers.get('User-Agent')
|
|
|
|
self.feeling_lucky = False
|
|
|
|
self.config = config
|
|
|
|
self.session = session
|
|
|
|
self.query = ''
|
2020-06-06 00:24:44 +03:00
|
|
|
self.cookies_disabled = cookies_disabled
|
2020-12-18 00:06:47 +03:00
|
|
|
self.search_type = self.request_params.get(
|
|
|
|
'tbm') if 'tbm' in self.request_params else ''
|
2020-06-02 21:54:47 +03:00
|
|
|
|
2021-03-08 20:22:04 +03:00
|
|
|
def __getitem__(self, name) -> Any:
|
2020-06-02 21:54:47 +03:00
|
|
|
return getattr(self, name)
|
|
|
|
|
2021-03-08 20:22:04 +03:00
|
|
|
def __setitem__(self, name, value) -> None:
|
2020-06-02 21:54:47 +03:00
|
|
|
return setattr(self, name, value)
|
|
|
|
|
2021-03-08 20:22:04 +03:00
|
|
|
def __delitem__(self, name) -> None:
|
2020-06-02 21:54:47 +03:00
|
|
|
return delattr(self, name)
|
|
|
|
|
2021-03-08 20:22:04 +03:00
|
|
|
def __contains__(self, name) -> bool:
|
2020-06-02 21:54:47 +03:00
|
|
|
return hasattr(self, name)
|
|
|
|
|
|
|
|
def new_search_query(self) -> str:
|
2021-03-08 20:22:04 +03:00
|
|
|
"""Parses a plaintext query into a valid string for submission
|
|
|
|
|
|
|
|
Also decrypts the query string, if encrypted (in the case of
|
|
|
|
paginated results).
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
str: A valid query string
|
|
|
|
|
|
|
|
"""
|
2020-06-02 21:54:47 +03:00
|
|
|
q = self.request_params.get('q')
|
|
|
|
|
|
|
|
if q is None or len(q) == 0:
|
|
|
|
return ''
|
|
|
|
else:
|
|
|
|
# Attempt to decrypt if this is an internal link
|
|
|
|
try:
|
2021-04-01 07:23:30 +03:00
|
|
|
q = Fernet(self.session['key']).decrypt(q.encode()).decode()
|
2020-06-02 21:54:47 +03:00
|
|
|
except InvalidToken:
|
|
|
|
pass
|
|
|
|
|
2020-12-18 00:06:47 +03:00
|
|
|
# Strip leading '! ' for "feeling lucky" queries
|
2020-06-02 21:54:47 +03:00
|
|
|
self.feeling_lucky = q.startswith('! ')
|
|
|
|
self.query = q[2:] if self.feeling_lucky else q
|
|
|
|
return self.query
|
|
|
|
|
2021-04-01 07:23:30 +03:00
|
|
|
def generate_response(self) -> str:
|
2021-03-08 20:22:04 +03:00
|
|
|
"""Generates a response for the user's query
|
2020-12-18 00:06:47 +03:00
|
|
|
|
2021-03-08 20:22:04 +03:00
|
|
|
Returns:
|
2021-04-01 07:23:30 +03:00
|
|
|
str: A string response to the search query, in the form of a URL
|
|
|
|
or string representation of HTML content.
|
2020-06-26 01:26:02 +03:00
|
|
|
|
2021-03-08 20:22:04 +03:00
|
|
|
"""
|
2020-06-02 21:54:47 +03:00
|
|
|
mobile = 'Android' in self.user_agent or 'iPhone' in self.user_agent
|
|
|
|
|
2021-04-01 07:23:30 +03:00
|
|
|
content_filter = Filter(self.session['key'],
|
2021-03-24 22:13:52 +03:00
|
|
|
mobile=mobile,
|
|
|
|
config=self.config)
|
|
|
|
full_query = gen_query(self.query,
|
|
|
|
self.request_params,
|
|
|
|
self.config,
|
|
|
|
content_filter.near)
|
Add tor and http/socks proxy support (#137)
* Add tor and http/socks proxy support
Allows users to enable/disable tor from the config menu, which will
forward all requests through Tor.
Also adds support for setting environment variables for alternative
proxy support. Setting the following variables will forward requests
through the proxy:
- WHOOGLE_PROXY_USER (optional)
- WHOOGLE_PROXY_PASS (optional)
- WHOOGLE_PROXY_TYPE (required)
- Can be "http", "socks4", or "socks5"
- WHOOGLE_PROXY_LOC (required)
- Format: "<ip address>:<port>"
See #30
* Refactor acquire_tor_conn -> acquire_tor_identity
Also updated travis CI to set up tor
* Add check for Tor socket on init, improve Tor error handling
Initializing the app sends a heartbeat request to Tor to check for
availability, and updates the home page config options accordingly. This
heartbeat is sent on every request, to ensure Tor support can be
reconfigured without restarting the entire app.
If Tor support is enabled, and a subsequent request fails, then a new
TorError exception is raised, and the Tor feature is disabled until a
valid connection is restored.
The max attempts has been updated to 10, since 5 seemed a bit too low
for how quickly the attempts go by.
* Change send_tor_signal arg type, update function doc
send_tor_signal now accepts a stem.Signal arg (a bit cleaner tbh). Also
added the doc string for the "disable" attribute in TorError.
* Fix tor identity logic in Request.send
* Update proxy init, change proxyloc var name
Proxy is now only initialized if both type and location are specified,
as neither have a default fallback and both are required. I suppose the
type could fall back to http, but seems safer this way.
Also refactored proxyurl -> proxyloc for the runtime args in order to
match the Dockerfile args.
* Add tor/proxy support for Docker builds, fix opensearch/init
The Dockerfile is now updated to include support for Tor configuration,
with a working torrc file included in the repo.
An issue with opensearch was fixed as well, which was uncovered during
testing and was simple enough to fix here. Likewise, DDG bang gen was
updated to only ever happen if the file didn't exist previously, as
testing with the file being regenerated every time was tedious.
* Add missing "@" for socks proxy requests
2020-10-29 03:47:42 +03:00
|
|
|
get_body = g.user_request.send(query=full_query)
|
2020-06-02 21:54:47 +03:00
|
|
|
|
|
|
|
# Produce cleanable html soup from response
|
2020-12-18 00:06:47 +03:00
|
|
|
html_soup = bsoup(content_filter.reskin(get_body.text), 'html.parser')
|
2021-03-24 22:13:52 +03:00
|
|
|
|
|
|
|
# Indicate whether or not a Tor connection is active
|
|
|
|
tor_banner = bsoup('', 'html.parser')
|
|
|
|
if g.user_request.tor_valid:
|
|
|
|
tor_banner = bsoup(TOR_BANNER, 'html.parser')
|
|
|
|
html_soup.insert(0, tor_banner)
|
2020-06-02 21:54:47 +03:00
|
|
|
|
|
|
|
if self.feeling_lucky:
|
2021-04-01 07:23:30 +03:00
|
|
|
return get_first_link(html_soup)
|
2020-06-02 21:54:47 +03:00
|
|
|
else:
|
|
|
|
formatted_results = content_filter.clean(html_soup)
|
2020-11-11 08:40:49 +03:00
|
|
|
|
|
|
|
# Append user config to all search links, if available
|
2020-12-18 00:06:47 +03:00
|
|
|
param_str = ''.join('&{}={}'.format(k, v)
|
|
|
|
for k, v in
|
|
|
|
self.request_params.to_dict(flat=True).items()
|
|
|
|
if self.config.is_safe_key(k))
|
2020-11-11 08:40:49 +03:00
|
|
|
for link in formatted_results.find_all('a', href=True):
|
2020-12-18 00:06:47 +03:00
|
|
|
if 'search?' not in link['href'] or link['href'].index(
|
|
|
|
'search?') > 1:
|
2020-11-11 08:40:49 +03:00
|
|
|
continue
|
|
|
|
link['href'] += param_str
|
|
|
|
|
2021-04-01 07:23:30 +03:00
|
|
|
return str(formatted_results)
|