diff options
author | Markus Heiser <markus.heiser@darmarit.de> | 2020-03-07 09:03:24 +0100 |
---|---|---|
committer | Markus Heiser <markus.heiser@darmarit.de> | 2020-03-07 09:03:24 +0100 |
commit | a258358633e18d3e5768223ebb05201bbd2e8ca4 (patch) | |
tree | 976e4d7a9cb99c81aaee6d9d6473393f433d482c | |
parent | c15337850e64562c376e5de57d8809a3a05b8a5d (diff) | |
parent | 3aa49cb8f98c6f9d953c2f7e4ce4f6e44f680255 (diff) | |
download | searxng-a258358633e18d3e5768223ebb05201bbd2e8ca4.tar.gz searxng-a258358633e18d3e5768223ebb05201bbd2e8ca4.zip |
Merge branch 'master' of https://github.com/asciimoo/searx into filtron
-rw-r--r-- | README.rst | 2 | ||||
-rw-r--r-- | docs/blog/index.rst | 1 | ||||
-rw-r--r-- | docs/blog/private-engines.rst | 63 |
3 files changed, 65 insertions, 1 deletions
diff --git a/README.rst b/README.rst index eb2c58ea2..a7b75d6e2 100644 --- a/README.rst +++ b/README.rst @@ -23,7 +23,7 @@ Go to the `searx-docker <https://github.com/searx/searx-docker>`__ project. Without Docker -------------- -For all of the details, follow this `step by step installation <https://asciimoo.github.io/searx/dev/install/installation.html>`__. +For all of the details, follow this `step by step installation <https://asciimoo.github.io/searx/admin/installation.html>`__. Note: the documentation needs to be updated. diff --git a/docs/blog/index.rst b/docs/blog/index.rst index bc90f4502..5a8135fdc 100644 --- a/docs/blog/index.rst +++ b/docs/blog/index.rst @@ -9,3 +9,4 @@ Blog python3 admin intro-offline + private-engines diff --git a/docs/blog/private-engines.rst b/docs/blog/private-engines.rst new file mode 100644 index 000000000..c26b3ed1c --- /dev/null +++ b/docs/blog/private-engines.rst @@ -0,0 +1,63 @@ +================================== +Limit access to your searx engines +================================== + +Administrators might find themselves wanting to limit access to some of the +enabled engines on their instances. It might be because they do not want to +expose some private information through an offline engine. Or they +would rather share engines only with their trusted friends or colleagues. + +Private engines +=============== + +To solve this issue private engines were introduced in :pull:`1823`. +A new option was added to engines named `tokens`. It expects a list +of strings. If the user making a request presents one of the tokens +of an engine, he/she is able to access information about the engine +and make search requests. + +Example configuration to restrict access to the Arch Linux Wiki engine: + +.. code:: yaml + + - name : arch linux wiki + engine : archlinux + shortcut : al + tokens : [ 'my-secret-token' ] + + +Unless a user has configured the right token, the engine is going +to be hidden from him/her. It is not going to be included in the +list of engines on the Preferences page and in the output of +`/config` REST API call. + +Tokens can be added to one's configuration on the Preferences page +under "Engine tokens". The input expects a comma separated list of +strings. + +The distribution of the tokens from the administrator to the users +is not carved in stone. As providing access to such engines +implies that the admin knows and trusts the user, we do not see +necessary to come up with a strict process. Instead, +we would like to add guidelines to the documentation of the feature. + +Next steps +========== + +Now that searx has support for both offline engines and private engines, +it is possible to add concrete engines which benefit from these features. +For example engines which search on the local host running the instance. +Be it searching your file system or querying a private database. Be creative +and come up with new solutions which fit your use case. + +Acknowledgement +=============== + +This development was sponsored by `Search and Discovery Fund`_ of `NLnet Foundation`_ . + +.. _Search and Discovery Fund: https://nlnet.nl/discovery +.. _NLnet Foundation: https://nlnet.nl/ + + +| Happy hacking. +| kvch // 2020.02.28 22:26 |