diff --git a/flake.lock b/flake.lock index 71fdd70..d66c865 100644 --- a/flake.lock +++ b/flake.lock @@ -502,11 +502,11 @@ ] }, "locked": { - "lastModified": 1683543852, - "narHash": "sha256-aS9qNcg9GwSYFLCWa3Lw+2nVPG11mmQ3B7Oka1hh04M=", + "lastModified": 1683762874, + "narHash": "sha256-EC7EDhzz/HjKppcaJFePlCOZqfVg8fooO/aWWUxwAJU=", "owner": "nix-community", "repo": "home-manager", - "rev": "3f3fa731ad0f99741d4dc98e8e1287b45e30b452", + "rev": "010c26987729d6a2e0e19da6df7c3f0465ae03b3", "type": "github" }, "original": { @@ -799,11 +799,11 @@ }, "nixpkgs_22-11": { "locked": { - "lastModified": 1683546353, - "narHash": "sha256-zEfx6q4fXK5wq+RCsyM0FyWBKNNhHTKMpCWkEpKDe2g=", + "lastModified": 1683627095, + "narHash": "sha256-8u9SejRpL2TrMuHBdhYh4FKc1OGPDLyWTpIbNTtoHsA=", "owner": "nixos", "repo": "nixpkgs", - "rev": "7629f9b0680d87c7775f3261bee746da5dac76d1", + "rev": "a08e061a4ee8329747d54ddf1566d34c55c895eb", "type": "github" }, "original": { @@ -946,11 +946,11 @@ }, "nur": { "locked": { - "lastModified": 1683605580, - "narHash": "sha256-cVDmvUvgQbbqIHLC+yF3cGhAGd7Dl+YAsn+QEhGa0BQ=", + "lastModified": 1683787468, + "narHash": "sha256-2eJgM7C6KCUhtGWLD73Vd4MEQXARuWaCqkkjJ4CyBIg=", "owner": "nix-community", "repo": "NUR", - "rev": "d2b4061a60934718566c5003cccc38be2aefdd68", + "rev": "3b9fad6aeb323eef6e249ca7b0eda828b7a33c57", "type": "github" }, "original": { diff --git a/nixos/common/modules/dns.nix b/nixos/common/modules/dns.nix index 8d375ec..e90e1c7 100644 --- a/nixos/common/modules/dns.nix +++ b/nixos/common/modules/dns.nix @@ -52,9 +52,9 @@ in { }; services.prometheus.exporters.unbound = mkIf cfg.enableMetrics { enable = true; - openFirewall = cfg.openFirewall; + inherit (cfg) openFirewall; + inherit (config.services.unbound) group; controlInterface = config.services.unbound.localControlSocketPath; - group = config.services.unbound.group; }; services.unbound = { enable = true;