That's the problem with discussion like this I talk about x you hear y you respond with z and I hear w. Happy news to you to.
- Posts
- 10
- Comments
- 318
- Joined
- 2 yr. ago
- Posts
- 10
- Comments
- 318
- Joined
- 2 yr. ago
Fediverse @lemmy.world Implementing Portable User Identities with DIDs
Ye Power Trippin' Bastards @lemmy.dbzer0.com Comment removed because it questioned the premise of a meme
Fediverse @lemmy.world Any peertube based podcasts on the fediverse?
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ @lemmy.dbzer0.com Whats the best way to get live content on the heigh sees
Modded Minecraft @sopuli.xyz Is there anyway i can transfer a world save from fabric to forge?
Programmer Humor @programming.dev Sydney is very concerned about lost data
Selfhosted @lemmy.world Advice for buulding a cheep NAS
Fediverse @lemmy.world Post licening to kneecap threads putting ads next to our content.
Eternity @lemdro.id I made thsi post a while ago still isnt fixed
Fediverse @lemmy.world Can you use the same domain/username for different fediverse services?

How are u running it? Bare metal? Docker?
So nginx, traffic, and cloudflare are both reverse proxies that can do SSL termination. Now cloudflare hijacks all SSL connection it proxies (essentially a mitm) and has configuration for if u would like SSL connection from cloudflare to ur own server.
All reverse proxies pass along headers to backend services indicating all sorts of things most importantly the remote client IP, and info about if the service is behind an ssl proxy.
I use client -> cloudflare -> nginx -> my services. The client makes an encrypted pipe between itself and cloudflare, cloudflare then terminates SSL does some scanning on the raw unencrypted packet makes an encrypted connection to nginx and attaches headers about the client. I have a SSL cert on my server where nginx does SSL termination of the cloudflare connection. Nginx then attaches more headers and does routing to passes it back to a backend service ie searxng (the service itself) the docker compose for searxng comes with a packaged traffic reverse proxie its not necessary here and will in fact cause all sorts of problems.
Here is the service in my docker compose for searxng:
searxng: container_name: searxng image: docker.io/searxng/searxng:latest restart: unless-stopped networks: - local_bridge - proxy volumes: - ./data/searxng:/etc/searxng environment: - SEARXNG_BASE_URL=https://${SEARXNG_HOSTNAME:-localhost}/ - SEARXNG_SECRET=${SEARXNG_SECRET} cap_drop: - ALL cap_add: - CHOWN - SETGID - SETUIDHere is the docker compose for my nginx config
certbot: image: certbot/dns-cloudflare # Command to obtain certificates (run once manually or integrate with a web server's startup) # Replace 'yourdomain.com' and '*.yourdomain.com' with your actual domain(s) volumes: - ./data/certbot/conf:/etc/letsencrypt - ./data/certbot/www:/var/www/certbot # A dummy webroot, not strictly necessary for DNS challenge but good practice - ./data/certbot/secrets:/etc/letsencrypt/secrets:ro # Mount secrets read-only command: certonly --dns-cloudflare --dns-cloudflare-credentials /etc/letsencrypt/secrets/cloudflare.ini --non-interactive --agree-tos --email ${LETS_ENCRYPT_EMAIL} --dns-cloudflare-propagation-seconds 60 -d example.com -d *.example.com environment: - TERM=xterm # Required for certbot to run in non-interactive mode gracefully nginx: image: nginx:latest container_name: nginx restart: unless-stopped ports: - "80:80" - "443:443" volumes: - ./data/nginx/cache:/var/cache - ./data/certbot/conf:/etc/letsencrypt - ./data/nginx.conf:/etc/nginx/nginx.conf - ./data/sites-enabled:/etc/nginx/sites-enabled - ./data/sites-available:/etc/nginx/sites-available - ./data/snippets:/config/nginx/snippets - ./data/www:/var/www/html depends_on: - certbot extra_hosts: - "example.com:127.0.0.1" - "*.example.com:127.0.0.1"I use certbot to issue SSL certs for my domain locally this is the cert that do SSL connection between nginx and cloudflare.
Then nginx can route connection to the searxng instance (ur gonna need a bunch of nginx config and I couldn't be bothered copy pasting that when an LLM can gen that it can probably gen all this tbh).
Also how u doing auth for searxng? Cos if ur opening it to the internet as a whole u might end up with lots of traffic from randos.