feat: removed searxng

This commit is contained in:
Nick 2025-11-07 01:13:37 -06:00
parent eef59d8114
commit e90d05f83d
3 changed files with 37 additions and 39 deletions

View file

@ -33,7 +33,7 @@ in
{
search = {
force = true;
default = if hostname == deimos.name then "Brave" else "SearXNG";
default = "Brave";
engines = aggregatedSearchEngines;
order = [
"AlternativeTo"

View file

@ -14,7 +14,6 @@ in
plasma
plymouth
sddm
searx
wireguard
;
};

View file

@ -26,47 +26,46 @@ let
in
{
services =
{
searx = {
enable = true;
redisCreateLocally = true;
uwsgiConfig = {
socket = "/run/searx/searx.sock";
http = ":${builtins.toString configHelpers.service.ports.port0}";
chmod-socket = "660";
};
settings = configImports;
services = {
searx = {
enable = true;
redisCreateLocally = true;
uwsgiConfig = {
socket = "/run/searx/searx.sock";
http = ":${builtins.toString configHelpers.service.ports.port0}";
chmod-socket = "660";
};
}
// (
if configHelpers.hostname == ceres.name then
{
caddy = {
virtualHosts = {
"${configHelpers.host}" = {
extraConfig = ''
@allowed_ips {
remote_ip ${mars.wireguard.ip0} ${deimos.wireguard.ip0}
}
settings = configImports;
};
}
// (
if configHelpers.hostname == ceres.name then
{
caddy = {
virtualHosts = {
"${configHelpers.host}" = {
extraConfig = ''
@allowed_ips {
remote_ip ${mars.wireguard.ip0} ${deimos.wireguard.ip0}
}
handle @allowed_ips {
redir /.well-known/carddav /remote.php/dav/ 301
redir /.well-known/caldav /remote.php/dav/ 301
reverse_proxy ${ceres.wireguard.ip0}:${toString configHelpers.service.ports.port0}
}
handle {
respond "Access Denied" 403
}
tls ${configHelpers.service.ssl.cert} ${configHelpers.service.ssl.key}
'';
};
handle @allowed_ips {
redir /.well-known/carddav /remote.php/dav/ 301
redir /.well-known/caldav /remote.php/dav/ 301
reverse_proxy ${ceres.wireguard.ip0}:${toString configHelpers.service.ports.port0}
}
handle {
respond "Access Denied" 403
}
tls ${configHelpers.service.ssl.cert} ${configHelpers.service.ssl.key}
'';
};
};
}
else
{ }
);
};
}
else
{ }
);
users.groups.searx.members = [ "caddy" ];
# systemd.services.caddy.serviceConfig.ProtectHome = false;