fix(searXNG): default lang, rate limit
This commit is contained in:
parent
3d3ff1235a
commit
752efca54f
@ -22,19 +22,18 @@ services:
|
|||||||
image: docker.io/searxng/searxng:latest
|
image: docker.io/searxng/searxng:latest
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
volumes:
|
volumes:
|
||||||
- config:/etc/searxng/
|
- ./config/:/etc/searxng/
|
||||||
- ./settings.yml:/etc/searxng/settings.yml
|
|
||||||
environment:
|
environment:
|
||||||
- SEARXNG_SECRET
|
- SEARXNG_SECRET
|
||||||
- REDIS_HOST=redis
|
- SEARXNG_REDIS_URL=redis://redis
|
||||||
networks:
|
networks:
|
||||||
|
- default
|
||||||
- nginx
|
- nginx
|
||||||
depends_on:
|
depends_on:
|
||||||
- redis
|
- redis
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
redis:
|
redis:
|
||||||
config:
|
|
||||||
sites:
|
sites:
|
||||||
external: true
|
external: true
|
||||||
certs:
|
certs:
|
||||||
|
40
searxng/config/limiter.toml
Normal file
40
searxng/config/limiter.toml
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
[real_ip]
|
||||||
|
|
||||||
|
# Number of values to trust for X-Forwarded-For.
|
||||||
|
|
||||||
|
x_for = 1
|
||||||
|
|
||||||
|
# The prefix defines the number of leading bits in an address that are compared
|
||||||
|
# to determine whether or not an address is part of a (client) network.
|
||||||
|
|
||||||
|
ipv4_prefix = 32
|
||||||
|
ipv6_prefix = 48
|
||||||
|
|
||||||
|
[botdetection.ip_limit]
|
||||||
|
|
||||||
|
# To get unlimited access in a local network, by default link-lokal addresses
|
||||||
|
# (networks) are not monitored by the ip_limit
|
||||||
|
filter_link_local = false
|
||||||
|
|
||||||
|
# activate link_token method in the ip_limit method
|
||||||
|
link_token = false
|
||||||
|
|
||||||
|
[botdetection.ip_lists]
|
||||||
|
|
||||||
|
# In the limiter, the ip_lists method has priority over all other methods -> if
|
||||||
|
# an IP is in the pass_ip list, it has unrestricted access and it is also not
|
||||||
|
# checked if e.g. the "user agent" suggests a bot (e.g. curl).
|
||||||
|
|
||||||
|
block_ip = [
|
||||||
|
# '93.184.216.34', # IPv4 of example.org
|
||||||
|
# '257.1.1.1', # invalid IP --> will be ignored, logged in ERROR class
|
||||||
|
]
|
||||||
|
|
||||||
|
pass_ip = [
|
||||||
|
# '192.168.0.0/16', # IPv4 private network
|
||||||
|
# 'fe80::/10' # IPv6 linklocal / wins over botdetection.ip_limit.filter_link_local
|
||||||
|
]
|
||||||
|
|
||||||
|
# Activate passlist of (hardcoded) IPs from the SearXNG organization,
|
||||||
|
# e.g. `check.searx.space`.
|
||||||
|
pass_searxng_org = true
|
@ -11,7 +11,7 @@ general:
|
|||||||
# mailto:contact@example.com
|
# mailto:contact@example.com
|
||||||
contact_url: false
|
contact_url: false
|
||||||
# record stats
|
# record stats
|
||||||
enable_metrics: true
|
enable_metrics: false
|
||||||
|
|
||||||
brand:
|
brand:
|
||||||
new_issue_url: https://github.com/searxng/searxng/issues/new
|
new_issue_url: https://github.com/searxng/searxng/issues/new
|
||||||
@ -34,9 +34,8 @@ search:
|
|||||||
default_lang: "auto"
|
default_lang: "auto"
|
||||||
# Available languages
|
# Available languages
|
||||||
languages:
|
languages:
|
||||||
- fr
|
- fr-FR
|
||||||
- en
|
- en-US
|
||||||
- all
|
|
||||||
# ban time in seconds after engine errors
|
# ban time in seconds after engine errors
|
||||||
ban_time_on_fail: 5
|
ban_time_on_fail: 5
|
||||||
# max ban time in seconds after engine errors
|
# max ban time in seconds after engine errors
|
||||||
@ -70,7 +69,7 @@ server:
|
|||||||
# by ${SEARXNG_URL}.
|
# by ${SEARXNG_URL}.
|
||||||
base_url: false # "http://example.com/location"
|
base_url: false # "http://example.com/location"
|
||||||
limiter: false # rate limit the number of request on the instance, block some bots
|
limiter: false # rate limit the number of request on the instance, block some bots
|
||||||
public_instance: true # enable features designed only for public instances
|
public_instance: false # enable features designed only for public instances
|
||||||
|
|
||||||
# If your instance owns a /etc/searxng/settings.yml file, then set the following
|
# If your instance owns a /etc/searxng/settings.yml file, then set the following
|
||||||
# values there.
|
# values there.
|
@ -1,7 +0,0 @@
|
|||||||
#!/bin/sh -e
|
|
||||||
|
|
||||||
sed -i "s|ultrasecretkey|$(openssl rand -hex 32)|g" /tmp/settings.yml
|
|
||||||
|
|
||||||
mv /tmp/settings.yml "$SEARXNG_SETTINGS_PATH"
|
|
||||||
|
|
||||||
exec "$@"
|
|
@ -19,7 +19,11 @@ server {
|
|||||||
|
|
||||||
proxy_set_header Host $host;
|
proxy_set_header Host $host;
|
||||||
proxy_set_header Connection $http_connection;
|
proxy_set_header Connection $http_connection;
|
||||||
|
|
||||||
|
# see flaskfix.py
|
||||||
proxy_set_header X-Scheme $scheme;
|
proxy_set_header X-Scheme $scheme;
|
||||||
|
|
||||||
|
# see limiter.py
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user