mirror of
https://gitlab.com/upRootNutrition/dotfiles.git
synced 2025-12-06 21:17:14 -06:00
feat: removed searxng
This commit is contained in:
parent
eef59d8114
commit
e90d05f83d
3 changed files with 37 additions and 39 deletions
|
|
@ -33,7 +33,7 @@ in
|
||||||
{
|
{
|
||||||
search = {
|
search = {
|
||||||
force = true;
|
force = true;
|
||||||
default = if hostname == deimos.name then "Brave" else "SearXNG";
|
default = "Brave";
|
||||||
engines = aggregatedSearchEngines;
|
engines = aggregatedSearchEngines;
|
||||||
order = [
|
order = [
|
||||||
"AlternativeTo"
|
"AlternativeTo"
|
||||||
|
|
|
||||||
|
|
@ -14,7 +14,6 @@ in
|
||||||
plasma
|
plasma
|
||||||
plymouth
|
plymouth
|
||||||
sddm
|
sddm
|
||||||
searx
|
|
||||||
wireguard
|
wireguard
|
||||||
;
|
;
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -26,47 +26,46 @@ let
|
||||||
|
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
services =
|
services = {
|
||||||
{
|
searx = {
|
||||||
searx = {
|
enable = true;
|
||||||
enable = true;
|
redisCreateLocally = true;
|
||||||
redisCreateLocally = true;
|
uwsgiConfig = {
|
||||||
uwsgiConfig = {
|
socket = "/run/searx/searx.sock";
|
||||||
socket = "/run/searx/searx.sock";
|
http = ":${builtins.toString configHelpers.service.ports.port0}";
|
||||||
http = ":${builtins.toString configHelpers.service.ports.port0}";
|
chmod-socket = "660";
|
||||||
chmod-socket = "660";
|
|
||||||
};
|
|
||||||
settings = configImports;
|
|
||||||
};
|
};
|
||||||
}
|
settings = configImports;
|
||||||
// (
|
};
|
||||||
if configHelpers.hostname == ceres.name then
|
}
|
||||||
{
|
// (
|
||||||
caddy = {
|
if configHelpers.hostname == ceres.name then
|
||||||
virtualHosts = {
|
{
|
||||||
"${configHelpers.host}" = {
|
caddy = {
|
||||||
extraConfig = ''
|
virtualHosts = {
|
||||||
@allowed_ips {
|
"${configHelpers.host}" = {
|
||||||
remote_ip ${mars.wireguard.ip0} ${deimos.wireguard.ip0}
|
extraConfig = ''
|
||||||
}
|
@allowed_ips {
|
||||||
|
remote_ip ${mars.wireguard.ip0} ${deimos.wireguard.ip0}
|
||||||
|
}
|
||||||
|
|
||||||
handle @allowed_ips {
|
handle @allowed_ips {
|
||||||
redir /.well-known/carddav /remote.php/dav/ 301
|
redir /.well-known/carddav /remote.php/dav/ 301
|
||||||
redir /.well-known/caldav /remote.php/dav/ 301
|
redir /.well-known/caldav /remote.php/dav/ 301
|
||||||
reverse_proxy ${ceres.wireguard.ip0}:${toString configHelpers.service.ports.port0}
|
reverse_proxy ${ceres.wireguard.ip0}:${toString configHelpers.service.ports.port0}
|
||||||
}
|
}
|
||||||
handle {
|
handle {
|
||||||
respond "Access Denied" 403
|
respond "Access Denied" 403
|
||||||
}
|
}
|
||||||
tls ${configHelpers.service.ssl.cert} ${configHelpers.service.ssl.key}
|
tls ${configHelpers.service.ssl.cert} ${configHelpers.service.ssl.key}
|
||||||
'';
|
'';
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
};
|
||||||
else
|
}
|
||||||
{ }
|
else
|
||||||
);
|
{ }
|
||||||
|
);
|
||||||
|
|
||||||
users.groups.searx.members = [ "caddy" ];
|
users.groups.searx.members = [ "caddy" ];
|
||||||
# systemd.services.caddy.serviceConfig.ProtectHome = false;
|
# systemd.services.caddy.serviceConfig.ProtectHome = false;
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue