From 99070e66f188e7d0a2148df570a52357373fbfb9 Mon Sep 17 00:00:00 2001 From: joy Date: Sun, 15 Dec 2024 22:31:06 +0100 Subject: [PATCH] update --- flake.lock | 42 ++++++++++++++--------------- modules/services/immich/default.nix | 1 + modules/services/nginx/default.nix | 2 +- 3 files changed, 23 insertions(+), 22 deletions(-) diff --git a/flake.lock b/flake.lock index 3e47ab7..ef9ae64 100644 --- a/flake.lock +++ b/flake.lock @@ -97,11 +97,11 @@ }, "locked": { "dir": "pkgs/firefox-addons", - "lastModified": 1733889799, - "narHash": "sha256-J6ki2+W06NDD4a9/cCvQLHzgUzRYA8pwmhfoTqMsZ1w=", + "lastModified": 1734235408, + "narHash": "sha256-0yHVZ2+VaW36/RTGHm1x3p+KS1oAWIj+TWObLDUzHfQ=", "owner": "rycee", "repo": "nur-expressions", - "rev": "66ba3fb0c1594481bf0ee625bdd612e1005ed132", + "rev": "02261a5dd442b8c6eb778c31e7967e734bc2ff76", "type": "gitlab" }, "original": { @@ -203,11 +203,11 @@ ] }, "locked": { - "lastModified": 1733951607, - "narHash": "sha256-CN6q6iCzxI1gkNyk4xLdwaMKi10r7n+aJkRzWj8PXwQ=", + "lastModified": 1734093295, + "narHash": "sha256-hSwgGpcZtdDsk1dnzA0xj5cNaHgN9A99hRF/mxMtwS4=", "owner": "nix-community", "repo": "home-manager", - "rev": "6e5b2d9e8014b5572e3367937a329e7053458d34", + "rev": "66c5d8b62818ec4c1edb3e941f55ef78df8141a8", "type": "github" }, "original": { @@ -312,11 +312,11 @@ }, "nixpkgs": { "locked": { - "lastModified": 1733759999, - "narHash": "sha256-463SNPWmz46iLzJKRzO3Q2b0Aurff3U1n0nYItxq7jU=", + "lastModified": 1734119587, + "narHash": "sha256-AKU6qqskl0yf2+JdRdD0cfxX4b9x3KKV5RqA6wijmPM=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "a73246e2eef4c6ed172979932bc80e1404ba2d56", + "rev": "3566ab7246670a43abd2ffa913cc62dad9cdf7d5", "type": "github" }, "original": { @@ -360,11 +360,11 @@ }, "nixpkgs-stable": { "locked": { - "lastModified": 1733730953, - "narHash": "sha256-dlK7n82FEyZlHH7BFHQAM5tua+lQO1Iv7aAtglc1O5s=", + "lastModified": 1734017764, + "narHash": "sha256-msOfmyJSjAHgIygI/JD0Ae3JsDv4rT54Nlfr5t6MQMQ=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "7109b680d161993918b0a126f38bc39763e5a709", + "rev": "64e9404f308e0f0a0d8cdd7c358f74e34802494b", "type": "github" }, "original": { @@ -448,11 +448,11 @@ ] }, "locked": { - "lastModified": 1733785344, - "narHash": "sha256-pm4cfEcPXripE36PYCl0A2Tu5ruwHEvTee+HzNk+SQE=", + "lastModified": 1733965552, + "narHash": "sha256-GZ4YtqkfyTjJFVCub5yAFWsHknG1nS/zfk7MuHht4Fs=", "owner": "Mic92", "repo": "sops-nix", - "rev": "a80af8929781b5fe92ddb8ae52e9027fae780d2a", + "rev": "2d73fc6ac4eba4b9a83d3cb8275096fbb7ab4004", "type": "github" }, "original": { @@ -468,11 +468,11 @@ ] }, "locked": { - "lastModified": 1733785344, - "narHash": "sha256-pm4cfEcPXripE36PYCl0A2Tu5ruwHEvTee+HzNk+SQE=", + "lastModified": 1733965552, + "narHash": "sha256-GZ4YtqkfyTjJFVCub5yAFWsHknG1nS/zfk7MuHht4Fs=", "owner": "Mic92", "repo": "sops-nix", - "rev": "a80af8929781b5fe92ddb8ae52e9027fae780d2a", + "rev": "2d73fc6ac4eba4b9a83d3cb8275096fbb7ab4004", "type": "github" }, "original": { @@ -500,11 +500,11 @@ "tinted-tmux": "tinted-tmux" }, "locked": { - "lastModified": 1733858997, - "narHash": "sha256-PMZdRUZQlouWgHFCFW8ANDFL6fUjZ67KAEaqRXwRwvc=", + "lastModified": 1734110168, + "narHash": "sha256-Q0eeLYn45ErXlqGQyXmLLHGe1mqnUiK0Y9wZRa1SNFI=", "owner": "danth", "repo": "stylix", - "rev": "bc25f3d69d3bb54548b772d7c2771e65cc37dc10", + "rev": "a9e3779949925ef22f5a215c5f49cf520dea30b1", "type": "github" }, "original": { diff --git a/modules/services/immich/default.nix b/modules/services/immich/default.nix index c675a16..8364a87 100644 --- a/modules/services/immich/default.nix +++ b/modules/services/immich/default.nix @@ -14,6 +14,7 @@ enableACME = true; extraConfig = '' client_max_body_size 512M; + client_body_buffer_size 32k; ''; locations."/".proxyPass = "http://localhost:2283"; }; diff --git a/modules/services/nginx/default.nix b/modules/services/nginx/default.nix index b2cfe06..3473119 100644 --- a/modules/services/nginx/default.nix +++ b/modules/services/nginx/default.nix @@ -38,7 +38,7 @@ virtualHosts."pin.${domain}" = { forceSSL = true; enableACME = true; - locations."/".proxyPass = "http://localhost:6060"; + locations."/".proxyPass = "http://localhost:8009"; }; virtualHosts."trans.${domain}" = { forceSSL = true;