mirror of
				https://github.com/searxng/searxng
				synced 2024-01-01 19:24:07 +01:00 
			
		
		
		
	 38431d2e14
			
		
	
	
		38431d2e14
		
	
	
	
	
		
			
			For correct determination of the IP to the request the function botdetection.get_real_ip() is implemented. This fonction is used in the ip_limit and link_token method of the botdetection and it is used in the self_info plugin. A documentation about the X-Forwarded-For header has been added. [1] https://github.com/searxng/searxng/pull/2357#issuecomment-1566211059 Signed-off-by: Markus Heiser <markus.heiser@darmarit.de>
		
			
				
	
	
		
			26 lines
		
	
	
	
		
			684 B
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			26 lines
		
	
	
	
		
			684 B
		
	
	
	
		
			Python
		
	
	
	
	
	
| # SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| # lint: pylint
 | |
| """.. _botdetection src:
 | |
| 
 | |
| X-Forwarded-For
 | |
| ===============
 | |
| 
 | |
| .. attention::
 | |
| 
 | |
|    A correct setup of the HTTP request headers ``X-Forwarded-For`` and
 | |
|    ``X-Real-IP`` is essential to be able to assign a request to an IP correctly:
 | |
| 
 | |
|    - `NGINX RequestHeader`_
 | |
|    - `Apache RequestHeader`_
 | |
| 
 | |
| .. _NGINX RequestHeader:
 | |
|     https://docs.searxng.org/admin/installation-nginx.html#nginx-s-searxng-site
 | |
| .. _Apache RequestHeader:
 | |
|     https://docs.searxng.org/admin/installation-apache.html#apache-s-searxng-site
 | |
| 
 | |
| .. autofunction:: searx.botdetection.get_real_ip
 | |
| 
 | |
| """
 | |
| 
 | |
| from ._helpers import dump_request
 | |
| from ._helpers import get_real_ip
 |