Compare commits

...

4 Commits
master ... mine

@ -483,7 +483,8 @@ docker.build() {
# define the docker image name # define the docker image name
GITHUB_USER=$(echo "${GIT_URL}" | sed 's/.*github\.com\/\([^\/]*\).*/\1/') GITHUB_USER=$(echo "${GIT_URL}" | sed 's/.*github\.com\/\([^\/]*\).*/\1/')
SEARXNG_IMAGE_NAME="${SEARXNG_IMAGE_NAME:-${GITHUB_USER:-searxng}/searxng}" #SEARXNG_IMAGE_NAME="${SEARXNG_IMAGE_NAME:-${GITHUB_USER:-searxng}/searxng}"
SEARXNG_IMAGE_NAME=cynthia/searxng
BUILD="build" BUILD="build"
if [ "$1" = "buildx" ]; then if [ "$1" = "buildx" ]; then

@ -13,10 +13,12 @@ Enable the plugin in ``settings.yml``:
- ``redis.url: ...`` check the value, see :ref:`settings redis` - ``redis.url: ...`` check the value, see :ref:`settings redis`
""" """
import ipaddress
import re import re
from flask import request from flask import request
from searx import redisdb from searx import get_setting, redisdb
from searx.redislib import incr_sliding_window from searx.redislib import incr_sliding_window
name = "Request limiter" name = "Request limiter"
@ -36,22 +38,43 @@ re_bot = re.compile(
) )
WHITELISTED_IPS = get_setting('server.limiter_whitelist_ip', default=[])
WHITELISTED_SUBNET = get_setting('server.limiter_whitelist_subnet', default=[])
def is_whitelist_ip(ip):
'''
Check if the given IP address belongs to the whitelisted list
of IP addresses or subnets.
'''
return ip in WHITELISTED_IPS or any(ipaddress.ip_address(ip) in
ipaddress.ip_network(subnet)
for subnet in WHITELISTED_SUBNET)
def is_accepted_request() -> bool: def is_accepted_request() -> bool:
# pylint: disable=too-many-return-statements # pylint: disable=too-many-return-statements
redis_client = redisdb.client() redis_client = redisdb.client()
user_agent = request.headers.get('User-Agent', '') user_agent = request.headers.get('User-Agent', '')
x_forwarded_for = request.headers.get('X-Forwarded-For', '') x_forwarded_for = request.headers.get('X-Forwarded-For', '')
# if the request source ip belongs to the whitelisted list of ip addresses or subnets
if is_whitelist_ip(x_forwarded_for):
return True
if request.path == '/image_proxy': if request.path == '/image_proxy':
if re_bot.match(user_agent): if re_bot.match(user_agent):
return False return False
return True return True
if request.path == '/search': if request.path == '/search':
c_burst = incr_sliding_window(redis_client, 'IP limit, burst' + x_forwarded_for, 20) c_burst = incr_sliding_window(
c_10min = incr_sliding_window(redis_client, 'IP limit, 10 minutes' + x_forwarded_for, 600) redis_client, 'IP limit, burst' + x_forwarded_for, 20)
c_10min = incr_sliding_window(
redis_client, 'IP limit, 10 minutes' + x_forwarded_for, 600)
if c_burst > 15 or c_10min > 150: if c_burst > 15 or c_10min > 150:
logger.debug("to many request") # pylint: disable=undefined-variable logger.debug(
"to many request") # pylint: disable=undefined-variable
return False return False
if re_bot.match(user_agent): if re_bot.match(user_agent):
@ -59,26 +82,33 @@ def is_accepted_request() -> bool:
return False return False
if len(request.headers.get('Accept-Language', '').strip()) == '': if len(request.headers.get('Accept-Language', '').strip()) == '':
logger.debug("missing Accept-Language") # pylint: disable=undefined-variable logger.debug(
"missing Accept-Language") # pylint: disable=undefined-variable
return False return False
if request.headers.get('Connection') == 'close': if request.headers.get('Connection') == 'close':
logger.debug("got Connection=close") # pylint: disable=undefined-variable logger.debug(
"got Connection=close") # pylint: disable=undefined-variable
return False return False
accept_encoding_list = [l.strip() for l in request.headers.get('Accept-Encoding', '').split(',')] accept_encoding_list = [l.strip() for l in request.headers.get(
'Accept-Encoding', '').split(',')]
if 'gzip' not in accept_encoding_list and 'deflate' not in accept_encoding_list: if 'gzip' not in accept_encoding_list and 'deflate' not in accept_encoding_list:
logger.debug("suspicious Accept-Encoding") # pylint: disable=undefined-variable logger.debug(
"suspicious Accept-Encoding") # pylint: disable=undefined-variable
return False return False
if 'text/html' not in request.accept_mimetypes: if 'text/html' not in request.accept_mimetypes:
logger.debug("Accept-Encoding misses text/html") # pylint: disable=undefined-variable logger.debug(
"Accept-Encoding misses text/html") # pylint: disable=undefined-variable
return False return False
if request.args.get('format', 'html') != 'html': if request.args.get('format', 'html') != 'html':
c = incr_sliding_window(redis_client, 'API limit' + x_forwarded_for, 3600) c = incr_sliding_window(
redis_client, 'API limit' + x_forwarded_for, 3600)
if c > 4: if c > 4:
logger.debug("API limit exceeded") # pylint: disable=undefined-variable logger.debug(
"API limit exceeded") # pylint: disable=undefined-variable
return False return False
return True return True
@ -94,7 +124,8 @@ def init(app, settings):
return False return False
if not redisdb.client(): if not redisdb.client():
logger.error("The limiter requires Redis") # pylint: disable=undefined-variable logger.error(
"The limiter requires Redis") # pylint: disable=undefined-variable
return False return False
app.before_request(pre_request) app.before_request(pre_request)

@ -1,5 +1,5 @@
export SEARXNG_URL='' export SEARXNG_URL=''
export SEARXNG_PORT='8888' export SEARXNG_PORT='8888'
export SEARXNG_BIND_ADDRESS='127.0.0.1' export SEARXNG_BIND_ADDRESS='127.0.0.1'
export GIT_URL='https://github.com/searxng/searxng' export GIT_URL='https://gitea.cynthia/sp4ke/searxng'
export GIT_BRANCH='master' export GIT_BRANCH='master'

Loading…
Cancel
Save