updating dalinar

This commit is contained in:
Chris Cochrun 2025-08-25 10:08:54 -05:00
parent 3f49b70467
commit c92e49b5f9
3 changed files with 31 additions and 14 deletions

24
flake.lock generated
View file

@ -450,16 +450,32 @@
}, },
"nixpkgs-stable_2": { "nixpkgs-stable_2": {
"locked": { "locked": {
"lastModified": 1751274312, "lastModified": 1746422338,
"narHash": "sha256-/bVBlRpECLVzjV19t5KMdMFWSwKLtb5RyXdjz3LJT+g=", "narHash": "sha256-NTtKOTLQv6dPfRe00OGSywg37A1FYqldS6xiNmqBUYc=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "5b35d248e9206c1f3baf8de6a7683fee126364aa",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-24.11",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs-stable_3": {
"locked": {
"lastModified": 1749086602,
"narHash": "sha256-DJcgJMekoxVesl9kKjfLPix2Nbr42i7cpEHJiTnBUwU=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "50ab793786d9de88ee30ec4e4c24fb4236fc2674", "rev": "4792576cb003c994bd7cc1edada3129def20b27d",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nixos", "owner": "nixos",
"ref": "nixos-24.11", "ref": "nixos-25.05",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }

View file

@ -4,8 +4,8 @@
inputs = { inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable"; nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
nixos-unstable-small.url = "github:nixos/nixpkgs/nixos-unstable-small"; nixos-unstable-small.url = "github:nixos/nixpkgs/nixos-unstable-small";
# nixpkgs.follows = "nixos-cosmic/nixpkgs"; nixpkgs.follows = "nixos-cosmic/nixpkgs";
nixpkgs-stable.url = "github:nixos/nixpkgs/nixos-24.11"; nixpkgs-stable.url = "github:nixos/nixpkgs/nixos-25.05";
nixos-hardware.url = "github:NixOS/nixos-hardware/master"; nixos-hardware.url = "github:NixOS/nixos-hardware/master";
home-manager = { home-manager = {
url = "github:nix-community/home-manager/master"; url = "github:nix-community/home-manager/master";

View file

@ -147,7 +147,6 @@
services.locate = { services.locate = {
enable = true; enable = true;
package = pkgs.plocate; package = pkgs.plocate;
localuser = null;
}; };
# Enable the OpenSSH daemon. # Enable the OpenSSH daemon.
@ -307,7 +306,7 @@
}; };
virtualHosts = { virtualHosts = {
"inv.cochrun.xyz".extraConfig = '' "inv.cochrun.xyz".extraConfig = ''
reverse_proxy http://127.0.0.1:3000 reverse_proxy http://127.0.0.1:3499
''; '';
}; };
virtualHosts = { virtualHosts = {
@ -335,11 +334,11 @@
reverse_proxy localhost:9091 reverse_proxy localhost:9091
''; '';
}; };
virtualHosts = { # virtualHosts = {
"rtl.cochrun.xyz".extraConfig = '' # "rtl.cochrun.xyz".extraConfig = ''
reverse_proxy localhost:3000 # reverse_proxy localhost:3000
''; # '';
}; # };
virtualHosts = { virtualHosts = {
"prowlarr.cochrun.xyz".extraConfig = '' "prowlarr.cochrun.xyz".extraConfig = ''
reverse_proxy localhost:9696 reverse_proxy localhost:9696
@ -386,7 +385,9 @@
}; };
services.adguardhome = { services.adguardhome = {
enabled = true; enable = true;
mutableSettings = true;
allowDHCP = true;
}; };
systemd.services = { systemd.services = {