diff --git a/modules/home/gui/apps/browsers/floorp/config/search/config/icons/sx.png b/modules/home/gui/apps/browsers/floorp/config/search/config/icons/sx.png new file mode 100644 index 0000000..85b11d6 Binary files /dev/null and b/modules/home/gui/apps/browsers/floorp/config/search/config/icons/sx.png differ diff --git a/modules/home/gui/apps/browsers/floorp/config/search/config/web.nix b/modules/home/gui/apps/browsers/floorp/config/search/config/web.nix index e2946e3..2cbf55e 100755 --- a/modules/home/gui/apps/browsers/floorp/config/search/config/web.nix +++ b/modules/home/gui/apps/browsers/floorp/config/search/config/web.nix @@ -17,4 +17,13 @@ { template = "https://kagi.com/search?q={searchTerms}"; } ]; }; + "SearXNG" = { + definedAliases = [ + "@sx" + ]; + icon = ./icons/sx.png; + urls = [ + { template = "http://localhost:8888/search?q={searchTerms}"; } + ]; + }; } diff --git a/modules/home/gui/apps/browsers/floorp/config/search/default.nix b/modules/home/gui/apps/browsers/floorp/config/search/default.nix index d2f1b33..8dbfef3 100755 --- a/modules/home/gui/apps/browsers/floorp/config/search/default.nix +++ b/modules/home/gui/apps/browsers/floorp/config/search/default.nix @@ -30,7 +30,7 @@ in { search = { force = true; - default = "Kagi"; + default = "SearXNG"; engines = aggregatedSearchEngines; order = [ "AlternativeTo" diff --git a/modules/nixos/default.nix b/modules/nixos/default.nix index 1308caa..aad138b 100755 --- a/modules/nixos/default.nix +++ b/modules/nixos/default.nix @@ -50,6 +50,7 @@ in website postgresql samba + searx vaultwarden forgejo wayland diff --git a/modules/nixos/services/searx/default.nix b/modules/nixos/services/searx/default.nix index 8019f0d..02f8cad 100644 --- a/modules/nixos/services/searx/default.nix +++ b/modules/nixos/services/searx/default.nix @@ -149,28 +149,14 @@ in virtualHosts = { "${host}" = { extraConfig = '' - # Handle all requests at root - handle /* { - # Using unix socket for uwsgi - reverse_proxy unix/${config.services.searx.uwsgiConfig.socket} { - transport unix - transport protocol uwsgi - } - } + redir /.well-known/carddav /remote.php/dav/ 301 + redir /.well-known/caldav /remote.php/dav/ 301 + + reverse_proxy ${localhost}:${toString service.ports.port0} - # TLS configuration tls ${service.ssl.cert} ${service.ssl.key} - # Compression (equivalent to nginx's gzip settings) encode zstd gzip - - # Common security headers (similar to nginx recommended settings) - header { - Strict-Transport-Security "max-age=31536000;" - X-Content-Type-Options "nosniff" - X-Frame-Options "DENY" - Referrer-Policy "no-referrer-when-downgrade" - } ''; }; };