diff options
| author | quentin@aristote.fr <quentin@aristote.fr> | 2025-11-30 21:00:04 +0100 |
|---|---|---|
| committer | quentin@aristote.fr <quentin@aristote.fr> | 2025-11-30 21:44:42 +0100 |
| commit | 307591d1ef64e2053994185c4173b8391f6ef96f (patch) | |
| tree | bb566dd465446c48113222132e9f889b235f9583 /config/services/web/searx/default.nix | |
| parent | 72ea5118e6dcc93d53053df09a009fd5bc824bec (diff) | |
nixos 25.05 -> 25.11
- tests: enable isNspawnContainer
- searx: remove morty (deprecated)
Flake lock file updates:
• Updated input 'my-nixpkgs':
'github:qaristote/my-nixpkgs/c032f4c09c83feb933d520ccce80e70a1516ca35' (2025-11-21)
→ 'github:qaristote/my-nixpkgs/e6d25dc678fa289ba488907e3cd49f2f8c330680' (2025-11-30)
• Updated input 'nixpkgs':
'github:NixOS/nixpkgs/1c8ba8d3f7634acac4a2094eef7c32ad9106532c' (2025-11-24)
→ 'github:NixOS/nixpkgs/d542db745310b6929708d9abea513f3ff19b1341' (2025-11-30)
Diffstat (limited to 'config/services/web/searx/default.nix')
| -rw-r--r-- | config/services/web/searx/default.nix | 51 |
1 files changed, 28 insertions, 23 deletions
diff --git a/config/services/web/searx/default.nix b/config/services/web/searx/default.nix index 5998068..da4cf88 100644 --- a/config/services/web/searx/default.nix +++ b/config/services/web/searx/default.nix @@ -1,35 +1,40 @@ -{ config, lib, pkgs, ... }: +{ + config, + lib, + ... +}: let cfg = { searx = config.services.searx; filtron = config.services.filtron; }; -in { - imports = [ ./searx ./filtron ./morty ]; +in +{ + imports = [ + ./searx + ./filtron + ]; - services.nginx.virtualHosts.searx = - lib.mkIf (cfg.searx.enable && cfg.filtron.enable) { - serverName = "searx.${config.networking.domain}"; - locations = { - "/" = { - proxyPass = "http://${cfg.filtron.listen.address}:${ - toString cfg.filtron.listen.port - }"; - extraConfig = '' - proxy_set_header Host $host; - proxy_set_header Connection $http_connection; - proxy_set_header X-Real-IP $remote_addr; - proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; - proxy_set_header X-Scheme $scheme; - # proxy_set_header X-Script-Name /; - ''; - }; - "/static/".alias = "${cfg.searx.package}/share/static/"; + services.nginx.virtualHosts.searx = lib.mkIf (cfg.searx.enable && cfg.filtron.enable) { + serverName = "searx.${config.networking.domain}"; + locations = { + "/" = { + proxyPass = "http://${cfg.filtron.listen.address}:${toString cfg.filtron.listen.port}"; + extraConfig = '' + proxy_set_header Host $host; + proxy_set_header Connection $http_connection; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Scheme $scheme; + # proxy_set_header X-Script-Name /; + ''; }; - forceSSL = true; - enableACME = true; + "/static/".alias = "${cfg.searx.package}/share/static/"; }; + forceSSL = true; + enableACME = true; + }; systemd.services.uwsgi.personal.monitor = true; } |
