bans.py 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184
  1. """
  2. API for checking values for bans
  3. Calling this instead of Ban.objects.find_ban is preffered, if you don't want
  4. to use validate_X_banned validators
  5. """
  6. from datetime import timedelta
  7. from django.utils import timezone
  8. from django.utils.dateparse import parse_datetime
  9. from misago.core import cachebuster
  10. from .models import BAN_IP, Ban, BanCache
  11. BAN_CACHE_SESSION_KEY = 'misago_ip_check'
  12. BAN_VERSION_KEY = 'misago_bans'
  13. def get_username_ban(username):
  14. try:
  15. return Ban.objects.get_username_ban(username)
  16. except Ban.DoesNotExist:
  17. return None
  18. def get_email_ban(email):
  19. try:
  20. return Ban.objects.get_email_ban(email)
  21. except Ban.DoesNotExist:
  22. return None
  23. def get_ip_ban(ip):
  24. try:
  25. return Ban.objects.get_ip_ban(ip)
  26. except Ban.DoesNotExist:
  27. return None
  28. def get_user_ban(user):
  29. """
  30. This function checks if user is banned
  31. When user model is available, this is preffered to calling
  32. get_email_ban(user.email) and get_username_ban(user.username)
  33. because it sets ban cache on user model
  34. """
  35. try:
  36. ban_cache = user.ban_cache
  37. if not ban_cache.is_valid:
  38. _set_user_ban_cache(user)
  39. except BanCache.DoesNotExist:
  40. user.ban_cache = BanCache(user=user)
  41. user.ban_cache = _set_user_ban_cache(user)
  42. if user.ban_cache.ban:
  43. return user.ban_cache
  44. else:
  45. return None
  46. def _set_user_ban_cache(user):
  47. ban_cache = user.ban_cache
  48. ban_cache.bans_version = cachebuster.get_version(BAN_VERSION_KEY)
  49. try:
  50. user_ban = Ban.objects.get_ban(username=user.username,
  51. email=user.email)
  52. ban_cache.ban = user_ban
  53. ban_cache.expires_on = user_ban.expires_on
  54. ban_cache.user_message = user_ban.user_message
  55. ban_cache.staff_message = user_ban.staff_message
  56. except Ban.DoesNotExist:
  57. ban_cache.ban = None
  58. ban_cache.expires_on = None
  59. ban_cache.user_message = None
  60. ban_cache.staff_message = None
  61. ban_cache.save()
  62. return ban_cache
  63. """
  64. Utility for checking if request came from banned IP
  65. This check may be performed frequently, which is why there is extra
  66. boilerplate that caches ban check result in session
  67. """
  68. def get_request_ip_ban(request):
  69. session_ban_cache = _get_session_bancache(request)
  70. if session_ban_cache:
  71. if session_ban_cache['is_banned']:
  72. return session_ban_cache
  73. else:
  74. return False
  75. found_ban = get_ip_ban(request.user_ip)
  76. ban_cache = request.session[BAN_CACHE_SESSION_KEY] = {
  77. 'version': cachebuster.get_version(BAN_VERSION_KEY),
  78. 'ip': request.user_ip,
  79. }
  80. if found_ban:
  81. if found_ban.expires_on:
  82. ban_cache['expires_on'] = found_ban.expires_on.isoformat()
  83. else:
  84. ban_cache['expires_on'] = None
  85. ban_cache.update({
  86. 'is_banned': True,
  87. 'message': found_ban.user_message
  88. })
  89. request.session[BAN_CACHE_SESSION_KEY] = ban_cache
  90. return _hydrate_session_cache(request.session[BAN_CACHE_SESSION_KEY])
  91. else:
  92. ban_cache['is_banned'] = False
  93. request.session[BAN_CACHE_SESSION_KEY] = ban_cache
  94. return None
  95. def _get_session_bancache(request):
  96. try:
  97. ban_cache = request.session[BAN_CACHE_SESSION_KEY]
  98. ban_cache = _hydrate_session_cache(ban_cache)
  99. if ban_cache['ip'] != request.user_ip:
  100. return None
  101. if not cachebuster.is_valid(BAN_VERSION_KEY, ban_cache['version']):
  102. return None
  103. if ban_cache.get('expires_on'):
  104. """
  105. Hydrate ban date
  106. """
  107. if ban_cache['expires_on'] < timezone.today():
  108. return None
  109. return ban_cache
  110. except KeyError:
  111. return None
  112. def _hydrate_session_cache(ban_cache):
  113. hydrated = ban_cache.copy()
  114. if hydrated.get('expires_on'):
  115. hydrated['expires_on'] = parse_datetime(hydrated['expires_on'])
  116. return hydrated
  117. """
  118. Utilities for front-end based bans
  119. """
  120. def ban_user(user, user_message=None, staff_message=None, length=None,
  121. expires_on=None):
  122. if not expires_on and length:
  123. expires_on = timezone.now() + timedelta(**length)
  124. ban = Ban.objects.create(
  125. banned_value=user.username.lower(),
  126. user_message=user_message,
  127. staff_message=staff_message,
  128. expires_on=expires_on
  129. )
  130. Ban.objects.invalidate_cache()
  131. return ban
  132. def ban_ip(ip, user_message=None, staff_message=None, length=None,
  133. expires_on=None):
  134. if not expires_on and length:
  135. expires_on = timezone.now() + timedelta(**length)
  136. ban = Ban.objects.create(
  137. check_type=BAN_IP,
  138. banned_value=ip,
  139. user_message=user_message,
  140. staff_message=staff_message,
  141. expires_on=expires_on
  142. )
  143. Ban.objects.invalidate_cache()
  144. return ban