# WARNING: Use this configuration for testing only! [server] # What port to listen on and where request are supposed to come from listen_on = "127.0.0.1:3000" # What header your reverse proxy sets that contains the real ip-address # Possible Values: Every Vaiation of SecureClientIpSource in the axum_client_ip package # https://docs.rs/axum-client-ip/latest/axum_client_ip/enum.SecureClientIpSource.html #ip_header = "RightmostXForwardedFor" # When you don't want to use a proxy server: ip_header = "ConnectInfo" # Allow querying of private range ips # enable if you want to use this service # on your internal network for some reason allow_private_ip_lookup = true [dns] # Enable the /dig enpoint allow_forward_lookup = true # Enable reverse lookup, make sure to configure the hidden_suffixes # to contain your locally used domains, to prevent onformation leakage allow_reverse_lookup = true # echoip-sltecave will pretend that domains # that end with one of these suffixes don't exist hidden_suffixes = [".com"] [geoip] # Path to geoip databses # Currently only the mmdb format is supported # Official databases can be obtained from maxmind.com asn_database = "mmdb/GeoLite2-ASN.mmdb" location_database = "mmdb/GeoLite2-City.mmdb" # If anyone knows a free (as in freedom) groip database # please open an issue so I can integrate it # https://codeberg.org/slatian/service.echoip-slatecave [template] # Path to the template directory, can contain glob patterns template_location = "templates" # Prefixes of user agents that should get a text reponse by default text_user_agents = ["curl/"] [ratelimit] # Configure a Quota for the Rate limiter # Please note that this depends on the ip_header being # configured correctly! # How many requests per minute are allowed # (How fast the leaky bucket drains) per_minute = 20 # How many requests may come in at once # (How much capacity the leaky bucket has) burst = 15 #Note: The ratelimit is implemented using the governor crate