feat: removed searxng

This commit is contained in:
Nick 2025-11-07 01:13:37 -06:00
parent eef59d8114
commit e90d05f83d
3 changed files with 37 additions and 39 deletions

View file

@ -33,7 +33,7 @@ in
{ {
search = { search = {
force = true; force = true;
default = if hostname == deimos.name then "Brave" else "SearXNG"; default = "Brave";
engines = aggregatedSearchEngines; engines = aggregatedSearchEngines;
order = [ order = [
"AlternativeTo" "AlternativeTo"

View file

@ -14,7 +14,6 @@ in
plasma plasma
plymouth plymouth
sddm sddm
searx
wireguard wireguard
; ;
}; };

View file

@ -26,47 +26,46 @@ let
in in
{ {
services = services = {
{ searx = {
searx = { enable = true;
enable = true; redisCreateLocally = true;
redisCreateLocally = true; uwsgiConfig = {
uwsgiConfig = { socket = "/run/searx/searx.sock";
socket = "/run/searx/searx.sock"; http = ":${builtins.toString configHelpers.service.ports.port0}";
http = ":${builtins.toString configHelpers.service.ports.port0}"; chmod-socket = "660";
chmod-socket = "660";
};
settings = configImports;
}; };
} settings = configImports;
// ( };
if configHelpers.hostname == ceres.name then }
{ // (
caddy = { if configHelpers.hostname == ceres.name then
virtualHosts = { {
"${configHelpers.host}" = { caddy = {
extraConfig = '' virtualHosts = {
@allowed_ips { "${configHelpers.host}" = {
remote_ip ${mars.wireguard.ip0} ${deimos.wireguard.ip0} extraConfig = ''
} @allowed_ips {
remote_ip ${mars.wireguard.ip0} ${deimos.wireguard.ip0}
}
handle @allowed_ips { handle @allowed_ips {
redir /.well-known/carddav /remote.php/dav/ 301 redir /.well-known/carddav /remote.php/dav/ 301
redir /.well-known/caldav /remote.php/dav/ 301 redir /.well-known/caldav /remote.php/dav/ 301
reverse_proxy ${ceres.wireguard.ip0}:${toString configHelpers.service.ports.port0} reverse_proxy ${ceres.wireguard.ip0}:${toString configHelpers.service.ports.port0}
} }
handle { handle {
respond "Access Denied" 403 respond "Access Denied" 403
} }
tls ${configHelpers.service.ssl.cert} ${configHelpers.service.ssl.key} tls ${configHelpers.service.ssl.cert} ${configHelpers.service.ssl.key}
''; '';
};
}; };
}; };
} };
else }
{ } else
); { }
);
users.groups.searx.members = [ "caddy" ]; users.groups.searx.members = [ "caddy" ];
# systemd.services.caddy.serviceConfig.ProtectHome = false; # systemd.services.caddy.serviceConfig.ProtectHome = false;