update flake
ci/woodpecker/push/woodpecker Pipeline was successful Details

pull/165/head
Vivian 2023-05-16 09:56:08 +02:00
parent 778388bf99
commit af3a5e2b7a
4 changed files with 24 additions and 29 deletions

View File

@ -88,11 +88,11 @@
"stable": "stable"
},
"locked": {
"lastModified": 1682737380,
"narHash": "sha256-n3rZkHZls9BNr35o3veK00UsM1KSh/oNTJjLkFbEOY8=",
"lastModified": 1684127527,
"narHash": "sha256-tAzgb2jgmRaX9HETry38h2OvBf9YkHEH1fFvIJQV9A0=",
"owner": "zhaofengli",
"repo": "colmena",
"rev": "be837ee341b6508c355035973d5f7c7e88d7c64f",
"rev": "caf33af7d854c8d9b88a8f3dae7adb1c24c1407b",
"type": "github"
},
"original": {
@ -502,11 +502,11 @@
]
},
"locked": {
"lastModified": 1683989410,
"narHash": "sha256-puF/QsIkp4ch0sf6M5mNzbdZtYcq2MJHcKre9wJ3ZYo=",
"lastModified": 1684157850,
"narHash": "sha256-xGHTCgvAxO5CgAL6IAgE/VGRX2wob2Y+DPyqpXJ32oQ=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "6702b22b9805bc1879715d4111e3764cd4237aed",
"rev": "c0deab0effd576e70343cb5df0c64428e0e0d010",
"type": "github"
},
"original": {
@ -702,11 +702,11 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1674641431,
"narHash": "sha256-qfo19qVZBP4qn5M5gXc/h1MDgAtPA5VxJm9s8RUAkVk=",
"lastModified": 1683408522,
"narHash": "sha256-9kcPh6Uxo17a3kK3XCHhcWiV1Yu1kYj22RHiymUhMkU=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "9b97ad7b4330aacda9b2343396eb3df8a853b4fc",
"rev": "897876e4c484f1e8f92009fd11b7d988a121a4e7",
"type": "github"
},
"original": {
@ -799,11 +799,11 @@
},
"nixpkgs_22-11": {
"locked": {
"lastModified": 1683928319,
"narHash": "sha256-maz0DRKixJVcNRMiAMWlJniiF8IuQ+WbfmlJJ8D+jfM=",
"lastModified": 1684130981,
"narHash": "sha256-5IPp/rUAOogega5xuRoxcpfkwlGDAyWdizL0Tp2GA4s=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "9656e85a15a0fe67847ee8cdb99a20d8df499962",
"rev": "d41eea2839de7de0f2cbe4aa90fde5db8afcd30a",
"type": "github"
},
"original": {
@ -815,11 +815,11 @@
},
"nixpkgs_3": {
"locked": {
"lastModified": 1684056101,
"narHash": "sha256-6xb8TPVNv+Tm6AeNH16yy9+E+dZ3EaPYQB62LiSOAac=",
"lastModified": 1684218676,
"narHash": "sha256-VOeTvnRk+U0S6Hj0b5cYlM7F2zi/o9G5aji1LZGUwfc=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "176aaf016abe98be350f8fb8cebbdd63d4b05be5",
"rev": "9318364586592bb95c8b1091427a501348960971",
"type": "github"
},
"original": {
@ -831,11 +831,11 @@
},
"nixpkgs_4": {
"locked": {
"lastModified": 1683408522,
"narHash": "sha256-9kcPh6Uxo17a3kK3XCHhcWiV1Yu1kYj22RHiymUhMkU=",
"lastModified": 1684049129,
"narHash": "sha256-7WB9LpnPNAS8oI7hMoHeKLNhRX7k3CI9uWBRSfmOCCE=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "897876e4c484f1e8f92009fd11b7d988a121a4e7",
"rev": "0470f36b02ef01d4f43c641bbf07020bcab71bf1",
"type": "github"
},
"original": {
@ -931,11 +931,11 @@
"pre-commit-hooks": "pre-commit-hooks"
},
"locked": {
"lastModified": 1684057446,
"narHash": "sha256-RgfgKKr7rBD4Fz9pjiikKgs8zxZ+PPls8fh4IwdNd6k=",
"lastModified": 1684141492,
"narHash": "sha256-j2fWY7kbOETSNDtlX7whkq2APe44PijzgaCTWV8oE/I=",
"owner": "pta2002",
"repo": "nixvim",
"rev": "c1a46a8360c864c4d4ef7d7240ff5403269cf00c",
"rev": "3600698abad00756947eb3a3d837beedf1c2f551",
"type": "github"
},
"original": {
@ -946,11 +946,11 @@
},
"nur": {
"locked": {
"lastModified": 1684042604,
"narHash": "sha256-kKaNKeDtMLOcsTf8XnOT0/rYvvcqTQNGiIr5rO9PcgQ=",
"lastModified": 1684218745,
"narHash": "sha256-UvP4puWuP+FD7/mxzd9UZZxeeggS5si3EyYMa6oZRR8=",
"owner": "nix-community",
"repo": "NUR",
"rev": "f3b31a6e1a397412d4c3afe5b508674cbfce2cee",
"rev": "4543a5dcb060e40588ba753f773793e34e7e9489",
"type": "github"
},
"original": {

View File

@ -28,7 +28,6 @@
overseerr = {
image = "ghcr.io/sct/overseerr:1.32.5";
environment = {
# LOG_LEVEL = "debug";
TZ = "Europe/Amsterdam";
};
ports = [ "5055:5055" ];

View File

@ -34,7 +34,6 @@ in {
# Use the GRUB 2 boot loader.
boot.loader.grub.enable = true;
boot.loader.grub.version = 2;
boot.loader.grub.device = "/dev/sda";
# This value determines the NixOS release from which the default

View File

@ -18,9 +18,6 @@ in {
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "22.11"; # Did you read the comment?
# Additional packages
environment.systemPackages = with pkgs; [ ];
networking.firewall.allowedTCPPorts = [ port metricsPort ];
vault-secrets.secrets.synapse = {