diff --git a/surveillance/deconnexion.py b/surveillance/deconnexion.py index 2df3a7ce..459e6ce7 100755 --- a/surveillance/deconnexion.py +++ b/surveillance/deconnexion.py @@ -433,12 +433,12 @@ for IP in infectes: ################################################################################ # Dans la table p2p on sélectionne les ip_src qui appartiennent au réseau -requete = "SELECT ip_src,id_p2p,count(ip_src) FROM p2p WHERE %s AND date > timestamp 'now' - interval '1 day' GROUP BY ip_src,id_p2p ORDER BY ip_src" % ip_src_in_crans +requete = "SELECT ip_src,id_p2p,count(ip_src) FROM p2p WHERE %s AND date > timestamp 'now' - interval '2 hours' GROUP BY ip_src,id_p2p ORDER BY ip_src" % ip_src_in_crans curseur.execute(requete) fraudeurs = curseur.fetchall() # Récupération des fraudeurs pour ne pas les resanctionner -requete = "SELECT ip_crans,protocole FROM avertis_p2p WHERE date > timestamp 'now' - interval '1 day'" +requete = "SELECT ip_crans,protocole FROM avertis_p2p WHERE date > timestamp 'now' - interval '2 hours'" curseur.execute(requete) avertisp2p = curseur.fetchall() @@ -462,7 +462,7 @@ for ip, id_p2p, nombre in fraudeurs: # Envoi du mail à disconnect if p2p.disconnect_mail: - requete = "select date from p2p where date > timestamp 'now' - interval '1 day' and ip_src='%s' order by date limit 1"%ip + requete = "select date from p2p where date > timestamp 'now' - interval '2 hours' and ip_src='%s' order by date limit 1"%ip curseur.execute(requete) date = curseur.fetchall()[0][0] corps = p2p.avertissement % { 'From': upload.expediteur,