New option to permit crawlers
This commit is contained in:
parent
a102fd83e8
commit
2840bf2293
2 changed files with 35 additions and 7 deletions
|
@ -309,16 +309,25 @@ function xml_status($st, $message = '') {
|
||||||
|
|
||||||
|
|
||||||
if(! function_exists('http_status_exit')) {
|
if(! function_exists('http_status_exit')) {
|
||||||
function http_status_exit($val) {
|
function http_status_exit($val, $description = array()) {
|
||||||
|
|
||||||
$err = '';
|
$err = '';
|
||||||
if($val >= 400)
|
if($val >= 400) {
|
||||||
$err = 'Error';
|
$err = 'Error';
|
||||||
|
if (!isset($description["title"]))
|
||||||
|
$description["title"] = $err." ".$val;
|
||||||
|
}
|
||||||
if($val >= 200 && $val < 300)
|
if($val >= 200 && $val < 300)
|
||||||
$err = 'OK';
|
$err = 'OK';
|
||||||
|
|
||||||
logger('http_status_exit ' . $val);
|
logger('http_status_exit ' . $val);
|
||||||
header($_SERVER["SERVER_PROTOCOL"] . ' ' . $val . ' ' . $err);
|
header($_SERVER["SERVER_PROTOCOL"] . ' ' . $val . ' ' . $err);
|
||||||
|
|
||||||
|
if (isset($description["title"])) {
|
||||||
|
$tpl = get_markup_template('http_status.tpl');
|
||||||
|
echo replace_macros($tpl, array('$title' => $description["title"],
|
||||||
|
'$description' => $description["description"]));
|
||||||
|
}
|
||||||
|
|
||||||
killme();
|
killme();
|
||||||
|
|
||||||
}}
|
}}
|
||||||
|
|
|
@ -95,10 +95,29 @@ function search_content(&$a) {
|
||||||
}
|
}
|
||||||
|
|
||||||
if(get_config('system','local_search') AND !local_user()) {
|
if(get_config('system','local_search') AND !local_user()) {
|
||||||
notice(t('Public access denied.').EOL);
|
http_status_exit(403,
|
||||||
return;
|
array("title" => t("Public access denied."),
|
||||||
//http_status_exit(403);
|
"description" => t("Only logged in users are permitted to perform a search.")));
|
||||||
//killme();
|
killme();
|
||||||
|
//notice(t('Public access denied.').EOL);
|
||||||
|
//return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (get_config('system','permit_crawling') AND !local_user()) {
|
||||||
|
// To-Do:
|
||||||
|
// - 10 requests are "free", after the 11th only a call per minute is allowed
|
||||||
|
|
||||||
|
$remote = $_SERVER["REMOTE_ADDR"];
|
||||||
|
$result = Cache::get("remote_search:".$remote);
|
||||||
|
if (!is_null($result)) {
|
||||||
|
if ($result > (time() - 60)) {
|
||||||
|
http_status_exit(429,
|
||||||
|
array("title" => t("Too Many Requests"),
|
||||||
|
"description" => t("Only one search per minute is permitted for not logged in users.")));
|
||||||
|
killme();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Cache::set("remote_search:".$remote, time(), CACHE_HOUR);
|
||||||
}
|
}
|
||||||
|
|
||||||
nav_set_selected('search');
|
nav_set_selected('search');
|
||||||
|
|
Loading…
Reference in a new issue