247 lines
7.0 KiB
Nix
247 lines
7.0 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
runDir = "/run/searx";
|
|
cfg = config.services.searx;
|
|
|
|
hasEngines =
|
|
builtins.hasAttr "engines" cfg.settings &&
|
|
cfg.settings.engines != { };
|
|
|
|
# Script to merge NixOS settings with
|
|
# the default settings.yml bundled in searx.
|
|
mergeConfig = ''
|
|
cd ${runDir}
|
|
# find the default settings.yml
|
|
default=$(find '${cfg.package}/' -name settings.yml)
|
|
|
|
# write NixOS settings as JSON
|
|
cat <<'EOF' > settings.json
|
|
${builtins.toJSON cfg.settings}
|
|
EOF
|
|
|
|
${optionalString hasEngines ''
|
|
# extract and convert the default engines array to an object
|
|
${pkgs.yq-go}/bin/yq r "$default" engines -j | \
|
|
${pkgs.jq}/bin/jq 'reduce .[] as $e ({}; .[$e.name] = $e)' \
|
|
> engines.json
|
|
|
|
# merge and update the NixOS engines with the newly created object
|
|
cp settings.json temp.json
|
|
${pkgs.jq}/bin/jq -s '. as [$s, $e] | $s | .engines |=
|
|
($e * . | to_entries | map (.value))' \
|
|
temp.json engines.json > settings.json
|
|
|
|
# clean up temporary files
|
|
rm {engines,temp}.json
|
|
''}
|
|
|
|
# merge the default and NixOS settings
|
|
${pkgs.yq-go}/bin/yq m -P settings.json "$default" > settings.yml
|
|
rm settings.json
|
|
|
|
# substitute environment variables
|
|
env -0 | while IFS='=' read -r -d ''' n v; do
|
|
sed "s#@$n@#$v#g" -i settings.yml
|
|
done
|
|
|
|
# set strict permissions
|
|
chmod 400 settings.yml
|
|
'';
|
|
|
|
in
|
|
|
|
{
|
|
|
|
imports = [
|
|
(mkRenamedOptionModule
|
|
[ "services" "searx" "configFile" ]
|
|
[ "services" "searx" "settingsFile" ])
|
|
];
|
|
|
|
###### interface
|
|
|
|
options = {
|
|
|
|
services.searx = {
|
|
|
|
enable = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
relatedPackages = [ "searx" ];
|
|
description = "Whether to enable Searx, the meta search engine.";
|
|
};
|
|
|
|
environmentFile = mkOption {
|
|
type = types.nullOr types.path;
|
|
default = null;
|
|
description = ''
|
|
Environment file (see <literal>systemd.exec(5)</literal>
|
|
"EnvironmentFile=" section for the syntax) to define variables for
|
|
Searx. This option can be used to safely include secret keys into the
|
|
Searx configuration.
|
|
'';
|
|
};
|
|
|
|
settings = mkOption {
|
|
type = types.attrs;
|
|
default = { };
|
|
example = literalExample ''
|
|
{ server.port = 8080;
|
|
server.bind_address = "0.0.0.0";
|
|
server.secret_key = "@SEARX_SECRET_KEY@";
|
|
|
|
engines.wolframalpha =
|
|
{ shortcut = "wa";
|
|
api_key = "@WOLFRAM_API_KEY@";
|
|
engine = "wolframalpha_api";
|
|
};
|
|
}
|
|
'';
|
|
description = ''
|
|
Searx settings. These will be merged with (taking precedence over)
|
|
the default configuration. It's also possible to refer to
|
|
environment variables
|
|
(defined in <xref linkend="opt-services.searx.environmentFile"/>)
|
|
using the syntax <literal>@VARIABLE_NAME@</literal>.
|
|
<note>
|
|
<para>
|
|
For available settings, see the Searx
|
|
<link xlink:href="https://searx.github.io/searx/admin/settings.html">docs</link>.
|
|
</para>
|
|
</note>
|
|
'';
|
|
};
|
|
|
|
settingsFile = mkOption {
|
|
type = types.path;
|
|
default = "${runDir}/settings.yml";
|
|
description = ''
|
|
The path of the Searx server settings.yml file. If no file is
|
|
specified, a default file is used (default config file has debug mode
|
|
enabled). Note: setting this options overrides
|
|
<xref linkend="opt-services.searx.settings"/>.
|
|
<warning>
|
|
<para>
|
|
This file, along with any secret key it contains, will be copied
|
|
into the world-readable Nix store.
|
|
</para>
|
|
</warning>
|
|
'';
|
|
};
|
|
|
|
package = mkOption {
|
|
type = types.package;
|
|
default = pkgs.searx;
|
|
defaultText = "pkgs.searx";
|
|
description = "searx package to use.";
|
|
};
|
|
|
|
runInUwsgi = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Whether to run searx in uWSGI as a "vassal", instead of using its
|
|
built-in HTTP server. This is the recommended mode for public or
|
|
large instances, but is unecessary for LAN or local-only use.
|
|
<warning>
|
|
<para>
|
|
The built-in HTTP server logs all queries by default.
|
|
</para>
|
|
</warning>
|
|
'';
|
|
};
|
|
|
|
uwsgiConfig = mkOption {
|
|
type = types.attrs;
|
|
default = { http = ":8080"; };
|
|
example = lib.literalExample ''
|
|
{
|
|
disable-logging = true;
|
|
http = ":8080"; # serve via HTTP...
|
|
socket = "/run/searx/searx.sock"; # ...or UNIX socket
|
|
}
|
|
'';
|
|
description = ''
|
|
Additional configuration of the uWSGI vassal running searx. It
|
|
should notably specify on which interfaces and ports the vassal
|
|
should listen.
|
|
'';
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
###### implementation
|
|
|
|
config = mkIf cfg.enable {
|
|
environment.systemPackages = [ cfg.package ];
|
|
|
|
users.users.searx =
|
|
{ description = "Searx daemon user";
|
|
group = "searx";
|
|
isSystemUser = true;
|
|
};
|
|
|
|
users.groups.searx = { };
|
|
|
|
systemd.services.searx-init = {
|
|
description = "Initialise Searx settings";
|
|
serviceConfig = {
|
|
Type = "oneshot";
|
|
RemainAfterExit = true;
|
|
User = "searx";
|
|
RuntimeDirectory = "searx";
|
|
RuntimeDirectoryMode = "750";
|
|
} // optionalAttrs (cfg.environmentFile != null)
|
|
{ EnvironmentFile = builtins.toPath cfg.environmentFile; };
|
|
script = mergeConfig;
|
|
};
|
|
|
|
systemd.services.searx = mkIf (!cfg.runInUwsgi) {
|
|
description = "Searx server, the meta search engine.";
|
|
wantedBy = [ "network.target" "multi-user.target" ];
|
|
requires = [ "searx-init.service" ];
|
|
after = [ "searx-init.service" ];
|
|
serviceConfig = {
|
|
User = "searx";
|
|
Group = "searx";
|
|
ExecStart = "${cfg.package}/bin/searx-run";
|
|
} // optionalAttrs (cfg.environmentFile != null)
|
|
{ EnvironmentFile = builtins.toPath cfg.environmentFile; };
|
|
environment.SEARX_SETTINGS_PATH = cfg.settingsFile;
|
|
};
|
|
|
|
systemd.services.uwsgi = mkIf (cfg.runInUwsgi)
|
|
{ requires = [ "searx-init.service" ];
|
|
after = [ "searx-init.service" ];
|
|
};
|
|
|
|
services.uwsgi = mkIf (cfg.runInUwsgi) {
|
|
enable = true;
|
|
plugins = [ "python3" ];
|
|
|
|
instance.type = "emperor";
|
|
instance.vassals.searx = {
|
|
type = "normal";
|
|
strict = true;
|
|
immediate-uid = "searx";
|
|
immediate-gid = "searx";
|
|
lazy-apps = true;
|
|
enable-threads = true;
|
|
module = "searx.webapp";
|
|
env = [ "SEARX_SETTINGS_PATH=${cfg.settingsFile}" ];
|
|
pythonPackages = self: [ cfg.package ];
|
|
} // cfg.uwsgiConfig;
|
|
};
|
|
|
|
};
|
|
|
|
meta.maintainers = with lib.maintainers; [ rnhmjoj ];
|
|
|
|
}
|