From e90d05f83d9ac5052d5e3d3f9ccc181b0053528d Mon Sep 17 00:00:00 2001 From: Nick Date: Fri, 7 Nov 2025 01:13:37 -0600 Subject: [PATCH] feat: removed searxng --- .../browsers/floorp/config/search/default.nix | 2 +- modules/nixos/default.nix | 1 - modules/nixos/services/searx/default.nix | 73 +++++++++---------- 3 files changed, 37 insertions(+), 39 deletions(-) diff --git a/modules/home/gui/apps/browsers/floorp/config/search/default.nix b/modules/home/gui/apps/browsers/floorp/config/search/default.nix index 54d0e0e..c2e4f7a 100755 --- a/modules/home/gui/apps/browsers/floorp/config/search/default.nix +++ b/modules/home/gui/apps/browsers/floorp/config/search/default.nix @@ -33,7 +33,7 @@ in { search = { force = true; - default = if hostname == deimos.name then "Brave" else "SearXNG"; + default = "Brave"; engines = aggregatedSearchEngines; order = [ "AlternativeTo" diff --git a/modules/nixos/default.nix b/modules/nixos/default.nix index e6f7b2d..c781eef 100755 --- a/modules/nixos/default.nix +++ b/modules/nixos/default.nix @@ -14,7 +14,6 @@ in plasma plymouth sddm - searx wireguard ; }; diff --git a/modules/nixos/services/searx/default.nix b/modules/nixos/services/searx/default.nix index 6c7e949..f7070e9 100755 --- a/modules/nixos/services/searx/default.nix +++ b/modules/nixos/services/searx/default.nix @@ -26,47 +26,46 @@ let in { - services = - { - searx = { - enable = true; - redisCreateLocally = true; - uwsgiConfig = { - socket = "/run/searx/searx.sock"; - http = ":${builtins.toString configHelpers.service.ports.port0}"; - chmod-socket = "660"; - }; - settings = configImports; + services = { + searx = { + enable = true; + redisCreateLocally = true; + uwsgiConfig = { + socket = "/run/searx/searx.sock"; + http = ":${builtins.toString configHelpers.service.ports.port0}"; + chmod-socket = "660"; }; - } - // ( - if configHelpers.hostname == ceres.name then - { - caddy = { - virtualHosts = { - "${configHelpers.host}" = { - extraConfig = '' - @allowed_ips { - remote_ip ${mars.wireguard.ip0} ${deimos.wireguard.ip0} - } + settings = configImports; + }; + } + // ( + if configHelpers.hostname == ceres.name then + { + caddy = { + virtualHosts = { + "${configHelpers.host}" = { + extraConfig = '' + @allowed_ips { + remote_ip ${mars.wireguard.ip0} ${deimos.wireguard.ip0} + } - handle @allowed_ips { - redir /.well-known/carddav /remote.php/dav/ 301 - redir /.well-known/caldav /remote.php/dav/ 301 - reverse_proxy ${ceres.wireguard.ip0}:${toString configHelpers.service.ports.port0} - } - handle { - respond "Access Denied" 403 - } - tls ${configHelpers.service.ssl.cert} ${configHelpers.service.ssl.key} - ''; - }; + handle @allowed_ips { + redir /.well-known/carddav /remote.php/dav/ 301 + redir /.well-known/caldav /remote.php/dav/ 301 + reverse_proxy ${ceres.wireguard.ip0}:${toString configHelpers.service.ports.port0} + } + handle { + respond "Access Denied" 403 + } + tls ${configHelpers.service.ssl.cert} ${configHelpers.service.ssl.key} + ''; }; }; - } - else - { } - ); + }; + } + else + { } + ); users.groups.searx.members = [ "caddy" ]; # systemd.services.caddy.serviceConfig.ProtectHome = false;