fix statix
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful

This commit is contained in:
Vivian 2023-05-11 09:48:16 +02:00
parent 0bf1eb4ed6
commit 0bb646a332
2 changed files with 11 additions and 11 deletions

View file

@ -502,11 +502,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1683543852, "lastModified": 1683762874,
"narHash": "sha256-aS9qNcg9GwSYFLCWa3Lw+2nVPG11mmQ3B7Oka1hh04M=", "narHash": "sha256-EC7EDhzz/HjKppcaJFePlCOZqfVg8fooO/aWWUxwAJU=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "3f3fa731ad0f99741d4dc98e8e1287b45e30b452", "rev": "010c26987729d6a2e0e19da6df7c3f0465ae03b3",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -799,11 +799,11 @@
}, },
"nixpkgs_22-11": { "nixpkgs_22-11": {
"locked": { "locked": {
"lastModified": 1683546353, "lastModified": 1683627095,
"narHash": "sha256-zEfx6q4fXK5wq+RCsyM0FyWBKNNhHTKMpCWkEpKDe2g=", "narHash": "sha256-8u9SejRpL2TrMuHBdhYh4FKc1OGPDLyWTpIbNTtoHsA=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "7629f9b0680d87c7775f3261bee746da5dac76d1", "rev": "a08e061a4ee8329747d54ddf1566d34c55c895eb",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -946,11 +946,11 @@
}, },
"nur": { "nur": {
"locked": { "locked": {
"lastModified": 1683605580, "lastModified": 1683787468,
"narHash": "sha256-cVDmvUvgQbbqIHLC+yF3cGhAGd7Dl+YAsn+QEhGa0BQ=", "narHash": "sha256-2eJgM7C6KCUhtGWLD73Vd4MEQXARuWaCqkkjJ4CyBIg=",
"owner": "nix-community", "owner": "nix-community",
"repo": "NUR", "repo": "NUR",
"rev": "d2b4061a60934718566c5003cccc38be2aefdd68", "rev": "3b9fad6aeb323eef6e249ca7b0eda828b7a33c57",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -52,9 +52,9 @@ in {
}; };
services.prometheus.exporters.unbound = mkIf cfg.enableMetrics { services.prometheus.exporters.unbound = mkIf cfg.enableMetrics {
enable = true; enable = true;
openFirewall = cfg.openFirewall; inherit (cfg) openFirewall;
inherit (config.services.unbound) group;
controlInterface = config.services.unbound.localControlSocketPath; controlInterface = config.services.unbound.localControlSocketPath;
group = config.services.unbound.group;
}; };
services.unbound = { services.unbound = {
enable = true; enable = true;