{ order rate_limit before basicauth order cgi before respond } (tor) { header { -Strict-Transport-Security -Referrer-Policy -Content-Security-Policy # disable clients from sniffing the media type X-Content-Type-Options nosniff Permissions-Policy "accelerometer=(), ambient-light-sensor=(), autoplay=(), battery=(), camera=(), clipboard-read=(), display-capture=(), document-domain=(), encrypted-media=(), fullscreen=(), geolocation=(), gyroscope=(), hid=(), idle-detection=(), interest-cohort=(), magnetometer=(), microphone=(), midi=(), payment=(), picture-in-picture=(), screen-wake-lock=(), serial=(), usb=(), sync-xhr=(), xr-spatial-tracking=()"; # clickjacking protection X-Frame-Options SAMEORIGIN Onion-Location http://{args[0]}.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion{path} defer } } (torloc) { header Onion-Location http://{args[0]}.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion{path} } (acmedns) { tls { dns rfc2136 { key_name "dynupd" key_alg "hmac-sha256" key "{{ rfc2136_key }}" server "45.145.41.226:53" } } } (def) { header { # disable FLoC tracking Permissions-Policy "accelerometer=(), ambient-light-sensor=(), autoplay=(), battery=(), camera=(), clipboard-read=(), display-capture=(), document-domain=(), encrypted-media=(), fullscreen=(), geolocation=(), gyroscope=(), hid=(), idle-detection=(), interest-cohort=(), magnetometer=(), microphone=(), midi=(), payment=(), picture-in-picture=(), screen-wake-lock=(), serial=(), usb=(), sync-xhr=(), xr-spatial-tracking=()"; # enable HSTS Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" # disable clients from sniffing the media type X-Content-Type-Options nosniff # clickjacking protection X-Frame-Options SAMEORIGIN defer } log { # Anonymised IPs, User-Agents, and Cookies, also removed the URI as mentionned in the privacy policy. # Subject to change, if we find any missing config we haven't filtered, it will be added. output file /var/log/caddy/caddy.log format filter { wrap json fields { request>remote_ip ip_mask { ipv4 16 ipv6 64 } request>client_ip ip_mask { ipv4 16 ipv6 64 } request>headers>X-Forwarded-For ip_mask { ipv4 16 ipv6 64 } request>headers>Cookie cookie { replace session REDACTED delete secret } request>headers>User-Agent delete request>headers>Onion-Location delete request>headers>Referer delete request>uri replace "/ABCDF" } } } @denied client_ip {{ blocked_ranges }} respond @denied "Unfortunately, your IP is part of a range that has been involved in mass spam to our servers. If you think our action was a mistake, please email contact@projectsegfau.lt." 403 import acmedns } import ./*.Caddyfile {{ inventory_hostname }}.projectsegfau.lt {% if inventory_hostname == 'eu' %} pizza1.projectsegfau.lt {% endif %} { redir https://wiki.projectsegfau.lt/index.php?title={{ wiki_page }} } cdn.projectsegfau.lt cdn.{{ server_prefix }}.projectsegfau.lt { encode zstd gzip root * /var/cdn file_server { browse } import def } lbry.{{ server_prefix }}.projectsegfau.lt lbry.projectsegfau.lt { reverse_proxy :3550 import def import torloc lbry } # We need this inventory_hostname block since nitter is only going to be on EU from now on {% if inventory_hostname == 'eu' %} nitter.projectsegfau.lt n.psf.lt { reverse_proxy :8387 import def route { reverse_proxy /outpost.goauthentik.io/* https://in.v.psf.lt:7444 { header_up Host {http.reverse_proxy.upstream.hostport} transport http { tls_insecure_skip_verify } } # Forward authentication requests to Authentik's outpost forward_auth https://in.v.psf.lt:7444 { transport http { tls_insecure_skip_verify } uri /outpost.goauthentik.io/auth/caddy # Ensure these headers are passed, using correct capitalization copy_headers X-Authentik-Username X-Authentik-Groups X-Authentik-Email X-Authentik-Name trusted_proxies private_ranges } } } nitter.eu.projectsegfau.lt nitter.us.projectsegfau.lt nitter.in.projectsegfau.lt { redir https://nitter.projectsegfau.lt{uri} } n.eu.psf.lt n.us.psf.lt n.in.psf.lt { redir https://n.psf.lt{uri} } {% endif %} libreddit.{{ server_prefix }}.projectsegfau.lt libreddit.projectsegfau.lt lr.psf.lt lr.{{ server_prefix }}.psf.lt { reverse_proxy :6464 import def log { # This is temporarily required to monitor nitter traffic due to scrapers being more active, so we need to monitor and rate limit them at a later date. output file /var/log/caddy/ratelimiters.log format json } import torloc libreddit } teddit.{{ server_prefix }}.projectsegfau.lt teddit.projectsegfau.lt t.psf.lt t.{{ server_prefix }}.psf.lt { redir https://libreddit.projectsegfau.lt{uri} import def import torloc teddit } inv.{{ server_prefix }}.projectsegfau.lt i.{{ server_prefix }}.psf.lt { reverse_proxy :7573 { header_up Host "inv.{{ server_prefix }}.projectsegfau.lt" } @pipedproxy { path /videoplayback path /videoplayback/* path /vi/* path /ggpht/* } handle @pipedproxy { reverse_proxy :6970 { header_up Host "pipedproxy.{{ server_prefix }}.projectsegfau.lt" } @jpgRedirect path_regexp maxres2 /vi/(.+)/maxres.jpg @thumbnailRedirect path /ggpht/* uri @thumbnailRedirect strip_prefix /ggpht rewrite @thumbnailRedirect ?host=yt3.ggpht.com uri @jpgRedirect replace /maxres.jpg /maxres2.jpg rewrite /vi/* ?host=i.ytimg.com } import def header -X-Frame-Options header -Content-Security-Policy @ratelimit not path /videoplayback/* /ggpht/* /vi/* /videoplayback /videojs/* /css/* /js/* /fonts/* /apple-touch-icon.png /favicon-16x16.png /feed/webhook /feed/webhook/* rate_limit @ratelimit {remote.ip} 10r/s rate_limit @ratelimit {remote.ip} 100r/m @ratelimit_pubsub path /feed/webhook /feed/webhook/* rate_limit @ratelimit_pubsub {remote.ip} 2r/s 404 log { # This is temporarily required to monitor nitter traffic due to scrapers being more active, so we need to monitor and rate limit them at a later date. output file /var/log/caddy/ratelimiters.log format json } } gothub.{{ server_prefix }}.projectsegfau.lt gothub.projectsegfau.lt gh.psf.lt gh.{{ server_prefix }}.psf.lt { reverse_proxy :1024 import def import torloc gothub } overflow.{{ server_prefix }}.projectsegfau.lt overflow.projectsegfau.lt o.psf.lt o.{{ server_prefix }}.psf.lt { reverse_proxy :8694 import def import torloc overflow } rimgo.{{ server_prefix }}.projectsegfau.lt rimgo.projectsegfau.lt rg.psf.lt rg.{{ server_prefix }}.psf.lt { reverse_proxy :9016 import def import torloc rimgo } bw.{{ server_prefix }}.projectsegfau.lt bw.projectsegfau.lt bw.psf.lt bw.{{ server_prefix }}.psf.lt { import def import torloc breezewiki reverse_proxy :10416 } scribe.{{ server_prefix }}.projectsegfau.lt scribe.projectsegfau.lt sc.psf.lt sc.{{ server_prefix }}.psf.lt { import def import torloc scribe reverse_proxy :8006 } translate.{{ server_prefix }}.projectsegfau.lt translate.projectsegfau.lt tl.psf.lt tl.{{ server_prefix }}.psf.lt { import def reverse_proxy :5046 import torloc translate } safetwitch.{{ server_prefix }}.projectsegfau.lt safetwitch.projectsegfau.lt tw.psf.lt tw.{{ server_prefix }}.psf.lt { import def reverse_proxy :5070 import torloc safetwitch } api.safetwitch.{{ server_prefix }}.projectsegfau.lt { reverse_proxy :5072 # Something is taking the port 5071, I've went ahead and changed it to 5072 temporarily, can be permanently kept. import def } hyperpipe.{{ server_prefix }}.projectsegfau.lt hyperpipe.projectsegfau.lt hp.psf.lt hp.{{ server_prefix }}.psf.lt { import def reverse_proxy :8843 } hyperpipebackend.{{ server_prefix }}.projectsegfau.lt { reverse_proxy :3536 import def } search.{{ server_prefix }}.projectsegfau.lt search.projectsegfau.lt s.psf.lt s.{{ server_prefix }}.psf.lt { import def import torloc search reverse_proxy :8081 { header_up X-Real-IP {remote_host} } @api { path /config path /healthz path /stats/errors path /stats/checker } @static { path /static/* } @notstatic { not path /static/* } @imageproxy { path /image_proxy } @notimageproxy { not path /image_proxy } header { # Enable HTTP Strict Transport Security (HSTS) to force clients to always connect via HTTPS Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" # Prevent some browsers from MIME-sniffing a response away from the declared Content-Type X-Content-Type-Options "nosniff" # Disable some features Permissions-Policy "accelerometer=(),ambient-light-sensor=(),autoplay=(),camera=(),encrypted-media=(),focus-without-user-activation=(),geolocation=(),gyroscope=(),magnetometer=(),microphone=(),midi=(),payment=(),picture-in-picture=(),speaker=(),sync-xhr=(),usb=(),vr=()" # Disable some features (legacy) Feature-Policy "accelerometer 'none';ambient-light-sensor 'none'; autoplay 'none';camera 'none';encrypted-media 'none';focus-without-user-activation 'none'; geolocation 'none';gyroscope 'none';magnetometer 'none';microphone 'none';midi 'none';payment 'none';picture-in-picture 'none'; speaker 'none';sync-xhr 'none';usb 'none';vr 'none'" # Referer Referrer-Policy "no-referrer" # X-Robots-Tag X-Robots-Tag "noindex, noarchive, nofollow" # Remove Server header -Server } import acmedns header @api { Access-Control-Allow-Methods "GET, OPTIONS" Access-Control-Allow-Origin "*" } # Cache header @static { # Cache Cache-Control "public, max-age=31536000" defer } header @notstatic { # No Cache Cache-Control "no-cache, no-store" Pragma "no-cache" } # CSP (see http://content-security-policy.com/ ) header @imageproxy { Content-Security-Policy "default-src 'none'; img-src 'self' data:" } header @notimageproxy { Content-Security-Policy "upgrade-insecure-requests; default-src 'none'; script-src 'self'; style-src 'self' 'unsafe-inline'; form-action 'self' https://github.com/searxng/searxng/issues/new; font-src 'self'; frame-ancestors 'self'; base-uri 'self'; connect-src 'self' https://overpass-api.de; img-src 'self' data: https://*.tile.openstreetmap.org; frame-src https://www.youtube-nocookie.com https://player.vimeo.com https://www.dailymotion.com https://www.deezer.com https://www.mixcloud.com https://w.soundcloud.com https://embed.spotify.com" } } piped.{{ server_prefix }}.projectsegfau.lt pipedproxy.{{ server_prefix }}.projectsegfau.lt pipedapi.{{ server_prefix }}.projectsegfau.lt { reverse_proxy :6970 header -X-Frame-Options import def } pi.{{ server_prefix }}.psf.lt { reverse_proxy :6970 { header_up Host "{% if server_prefix == 'eu' %}piped.projectsegfau.lt{%else%}piped.{{ server_prefix }}.projectsegfau.lt{%endif%}" } header -X-Frame-Options import def } priviblur.{{ server_prefix }}.projectsegfau.lt priviblur.projectsegfau.lt pb.psf.lt pb.{{ server_prefix }}.psf.lt { import def reverse_proxy :9084 import torloc priviblur } lace.{{ server_prefix }}.projectsegfau.lt lace.projectsegfau.lt l.psf.lt l.{{ server_prefix }}.psf.lt { import def reverse_proxy :9029 import torloc lace } :8093 { cgi /vnstat /var/lib/caddy/www/vnstat-metrics.cgi }