bans.py 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172
  1. """
  2. API for checking values for bans
  3. Calling this instead of Ban.objects.find_ban is preffered, if you don't want
  4. to use validate_X_banned validators
  5. """
  6. from datetime import timedelta
  7. from django.utils import timezone
  8. from django.utils.dateparse import parse_datetime
  9. from .constants import BANS_CACHE
  10. from .models import Ban, BanCache
  11. CACHE_SESSION_KEY = "misago_ip_check"
  12. def get_username_ban(username, registration_only=False):
  13. try:
  14. return Ban.objects.get_username_ban(username, registration_only)
  15. except Ban.DoesNotExist:
  16. return None
  17. def get_email_ban(email, registration_only=False):
  18. try:
  19. return Ban.objects.get_email_ban(email, registration_only)
  20. except Ban.DoesNotExist:
  21. return None
  22. def get_ip_ban(ip, registration_only=False):
  23. try:
  24. return Ban.objects.get_ip_ban(ip, registration_only)
  25. except Ban.DoesNotExist:
  26. return None
  27. def get_user_ban(user, cache_versions):
  28. """
  29. This function checks if user is banned
  30. When user model is available, this is preffered to calling
  31. get_email_ban(user.email) and get_username_ban(user.username)
  32. because it sets ban cache on user model
  33. """
  34. try:
  35. ban_cache = user.ban_cache
  36. if not ban_cache.is_valid(cache_versions):
  37. _set_user_ban_cache(user)
  38. except BanCache.DoesNotExist:
  39. user.ban_cache = BanCache(user=user)
  40. user.ban_cache = _set_user_ban_cache(user, cache_versions)
  41. if user.ban_cache.ban:
  42. return user.ban_cache
  43. else:
  44. return None
  45. def _set_user_ban_cache(user, cache_versions):
  46. ban_cache = user.ban_cache
  47. ban_cache.cache_version = cache_versions[BANS_CACHE]
  48. try:
  49. user_ban = Ban.objects.get_ban(
  50. username=user.username, email=user.email, registration_only=False
  51. )
  52. ban_cache.ban = user_ban
  53. ban_cache.expires_on = user_ban.expires_on
  54. ban_cache.user_message = user_ban.user_message
  55. ban_cache.staff_message = user_ban.staff_message
  56. except Ban.DoesNotExist:
  57. ban_cache.ban = None
  58. ban_cache.expires_on = None
  59. ban_cache.user_message = None
  60. ban_cache.staff_message = None
  61. ban_cache.save()
  62. return ban_cache
  63. def get_request_ip_ban(request):
  64. """
  65. Utility for checking if request came from banned IP
  66. This check may be performed frequently, which is why there is extra
  67. boilerplate that caches ban check result in session
  68. """
  69. session_ban_cache = _get_session_bancache(request)
  70. if session_ban_cache:
  71. if session_ban_cache["is_banned"]:
  72. return session_ban_cache
  73. else:
  74. return False
  75. found_ban = get_ip_ban(request.user_ip)
  76. ban_cache = request.session[CACHE_SESSION_KEY] = {
  77. "version": request.cache_versions[BANS_CACHE],
  78. "ip": request.user_ip,
  79. }
  80. if found_ban:
  81. if found_ban.expires_on:
  82. ban_cache["expires_on"] = found_ban.expires_on.isoformat()
  83. else:
  84. ban_cache["expires_on"] = None
  85. ban_cache.update({"is_banned": True, "message": found_ban.user_message})
  86. request.session[CACHE_SESSION_KEY] = ban_cache
  87. return _hydrate_session_cache(request.session[CACHE_SESSION_KEY])
  88. else:
  89. ban_cache["is_banned"] = False
  90. request.session[CACHE_SESSION_KEY] = ban_cache
  91. return None
  92. def _get_session_bancache(request):
  93. try:
  94. ban_cache = request.session[CACHE_SESSION_KEY]
  95. ban_cache = _hydrate_session_cache(ban_cache)
  96. if ban_cache["ip"] != request.user_ip:
  97. return None
  98. if ban_cache["version"] != request.cache_versions[BANS_CACHE]:
  99. return None
  100. if ban_cache.get("expires_on"):
  101. if ban_cache["expires_on"] < timezone.today():
  102. return None
  103. return ban_cache
  104. except KeyError:
  105. return None
  106. def _hydrate_session_cache(ban_cache):
  107. hydrated = ban_cache.copy()
  108. if hydrated.get("expires_on"):
  109. hydrated["expires_on"] = parse_datetime(hydrated["expires_on"])
  110. return hydrated
  111. # Utilities for front-end based bans
  112. def ban_user(user, user_message=None, staff_message=None, length=None, expires_on=None):
  113. if not expires_on and length:
  114. expires_on = timezone.now() + timedelta(**length)
  115. ban = Ban.objects.create(
  116. banned_value=user.username.lower(),
  117. user_message=user_message,
  118. staff_message=staff_message,
  119. expires_on=expires_on,
  120. )
  121. Ban.objects.invalidate_cache()
  122. return ban
  123. def ban_ip(ip, user_message=None, staff_message=None, length=None, expires_on=None):
  124. if not expires_on and length:
  125. expires_on = timezone.now() + timedelta(**length)
  126. ban = Ban.objects.create(
  127. check_type=Ban.IP,
  128. banned_value=ip,
  129. user_message=user_message,
  130. staff_message=staff_message,
  131. expires_on=expires_on,
  132. )
  133. Ban.objects.invalidate_cache()
  134. return ban