183 lines
3.5 KiB
Python
Executable File
183 lines
3.5 KiB
Python
Executable File
from .get import *
|
|
from .alerts import send_notification
|
|
from files.helpers.const import *
|
|
|
|
|
|
def get_logged_in_user():
|
|
|
|
if request.headers.get("Authorization"):
|
|
token = request.headers.get("Authorization")
|
|
if not token: return None
|
|
|
|
client = g.db.query(ClientAuth).options(lazyload('*')).filter(ClientAuth.access_token == token).first()
|
|
|
|
x = (client.user, client) if client else (None, None)
|
|
|
|
|
|
else:
|
|
|
|
uid = session.get("user_id")
|
|
nonce = session.get("login_nonce", 0)
|
|
if not uid: x= (None, None)
|
|
try:
|
|
if g.db: v = g.db.query(User).options(lazyload('*')).filter_by(id=uid).first()
|
|
else: v = None
|
|
except: v = None
|
|
|
|
if v and (nonce < v.login_nonce):
|
|
x= (None, None)
|
|
else:
|
|
x=(v, None)
|
|
|
|
|
|
if x[0]: x[0].client=x[1]
|
|
|
|
return x[0]
|
|
|
|
|
|
def check_ban_evade(v):
|
|
|
|
if not v or not v.ban_evade or v.admin_level > 0 or v.is_suspended: return
|
|
|
|
if random.randint(0,30) < v.ban_evade:
|
|
v.ban(reason="permaban evasion")
|
|
send_notification(NOTIFICATIONS_ACCOUNT, v, "Your account has been permanently suspended for the following reason:\n\n> permaban evasion")
|
|
|
|
for post in g.db.query(Submission).options(lazyload('*')).filter_by(author_id=v.id).all():
|
|
if post.is_banned:
|
|
continue
|
|
|
|
post.is_banned=True
|
|
post.ban_reason="permaban evasion"
|
|
g.db.add(post)
|
|
|
|
ma=ModAction(
|
|
kind="ban_post",
|
|
user_id=AUTOJANNY_ACCOUNT,
|
|
target_submission_id=post.id,
|
|
note="permaban evasion"
|
|
)
|
|
g.db.add(ma)
|
|
|
|
for comment in g.db.query(Comment).options(lazyload('*')).filter_by(author_id=v.id).all():
|
|
if comment.is_banned:
|
|
continue
|
|
|
|
comment.is_banned=True
|
|
comment.ban_reason="permaban evasion"
|
|
g.db.add(comment)
|
|
|
|
try:
|
|
ma=ModAction(
|
|
kind="ban_comment",
|
|
user_id=AUTOJANNY_ACCOUNT,
|
|
target_comment_id=comment.id,
|
|
note="ban evasion"
|
|
)
|
|
g.db.add(ma)
|
|
except: pass
|
|
|
|
else:
|
|
v.ban_evade +=1
|
|
g.db.add(v)
|
|
|
|
g.db.commit()
|
|
|
|
|
|
|
|
def auth_desired(f):
|
|
def wrapper(*args, **kwargs):
|
|
|
|
v = get_logged_in_user()
|
|
check_ban_evade(v)
|
|
|
|
resp = make_response(f(*args, v=v, **kwargs))
|
|
return resp
|
|
|
|
wrapper.__name__ = f.__name__
|
|
return wrapper
|
|
|
|
|
|
def auth_required(f):
|
|
|
|
def wrapper(*args, **kwargs):
|
|
|
|
v = get_logged_in_user()
|
|
|
|
if not v: abort(401)
|
|
|
|
check_ban_evade(v)
|
|
|
|
g.v = v
|
|
|
|
resp = make_response(f(*args, v=v, **kwargs))
|
|
return resp
|
|
|
|
wrapper.__name__ = f.__name__
|
|
return wrapper
|
|
|
|
|
|
def is_not_banned(f):
|
|
|
|
def wrapper(*args, **kwargs):
|
|
|
|
v = get_logged_in_user()
|
|
|
|
if not v: abort(401)
|
|
|
|
check_ban_evade(v)
|
|
|
|
if v.is_suspended:
|
|
abort(403)
|
|
|
|
g.v = v
|
|
|
|
resp = make_response(f(*args, v=v, **kwargs))
|
|
return resp
|
|
|
|
wrapper.__name__ = f.__name__
|
|
return wrapper
|
|
|
|
|
|
def admin_level_required(x):
|
|
|
|
def wrapper_maker(f):
|
|
|
|
def wrapper(*args, **kwargs):
|
|
|
|
v = get_logged_in_user()
|
|
|
|
if not v: abort(401)
|
|
|
|
if v.admin_level < x: abort(403)
|
|
|
|
g.v = v
|
|
|
|
response = f(*args, v=v, **kwargs)
|
|
|
|
if isinstance(response, tuple): resp = make_response(response[0])
|
|
else: resp = make_response(response)
|
|
|
|
return resp
|
|
|
|
wrapper.__name__ = f.__name__
|
|
return wrapper
|
|
|
|
return wrapper_maker
|
|
|
|
|
|
def validate_formkey(f):
|
|
def wrapper(*args, v, **kwargs):
|
|
|
|
if not request.headers.get("Authorization"):
|
|
|
|
submitted_key = request.values.get("formkey", None)
|
|
|
|
if not submitted_key: abort(401)
|
|
|
|
elif not v.validate_formkey(submitted_key): abort(401)
|
|
|
|
return f(*args, v=v, **kwargs)
|
|
|
|
wrapper.__name__ = f.__name__
|
|
return wrapper |