summaryrefslogtreecommitdiff
path: root/searx/plugins/self_info.py
diff options
context:
space:
mode:
authorAdam Tauber <asciimoo@gmail.com>2015-06-15 09:42:01 -0400
committerAdam Tauber <asciimoo@gmail.com>2015-06-15 09:42:01 -0400
commita9d92c3874dd8d44a5b6ce0e823972823637529a (patch)
treeb63097fd8293a0516aa9684f1b1ee2f801e24494 /searx/plugins/self_info.py
parentc9b8c7f8deffce93b920273171a4f8f9d6339ea7 (diff)
parent0fe362bacf608f535680a68c0d38784b331a45e3 (diff)
Merge pull request #371 from framasoft/add-useragent-plugin
Add a self user agent plugin
Diffstat (limited to 'searx/plugins/self_info.py')
-rw-r--r--searx/plugins/self_info.py44
1 files changed, 44 insertions, 0 deletions
diff --git a/searx/plugins/self_info.py b/searx/plugins/self_info.py
new file mode 100644
index 000000000..5ca994526
--- /dev/null
+++ b/searx/plugins/self_info.py
@@ -0,0 +1,44 @@
+'''
+searx is free software: you can redistribute it and/or modify
+it under the terms of the GNU Affero General Public License as published by
+the Free Software Foundation, either version 3 of the License, or
+(at your option) any later version.
+
+searx is distributed in the hope that it will be useful,
+but WITHOUT ANY WARRANTY; without even the implied warranty of
+MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+GNU Affero General Public License for more details.
+
+You should have received a copy of the GNU Affero General Public License
+along with searx. If not, see < http://www.gnu.org/licenses/ >.
+
+(C) 2015 by Adam Tauber, <asciimoo@gmail.com>
+'''
+from flask.ext.babel import gettext
+import re
+name = "Self Informations"
+description = gettext('Displays your IP if the query is "ip" and your user agent if the query contains "user agent".')
+default_on = True
+
+
+# Self User Agent regex
+p = re.compile('.*user[ -]agent.*', re.IGNORECASE)
+
+
+# attach callback to the post search hook
+# request: flask request object
+# ctx: the whole local context of the pre search hook
+def post_search(request, ctx):
+ if ctx['search'].query == 'ip':
+ x_forwarded_for = request.headers.getlist("X-Forwarded-For")
+ if x_forwarded_for:
+ ip = x_forwarded_for[0]
+ else:
+ ip = request.remote_addr
+ ctx['search'].answers.clear()
+ ctx['search'].answers.add(ip)
+ elif p.match(ctx['search'].query):
+ ua = request.user_agent
+ ctx['search'].answers.clear()
+ ctx['search'].answers.add(ua)
+ return True