From 8903f8ac0e92633be00901f78a88b1bd7ff388f9 Mon Sep 17 00:00:00 2001 From: blake Date: Sat, 11 Oct 2025 19:55:23 -0500 Subject: [PATCH] 324 current 2025-10-11 19:52:06 25.05.20251006.20c4598 6.12.50 * --- flake.nix | 2 +- modules/homelab/services/gitea/default.nix | 4 ++-- modules/homelab/services/nginx-proxy/default.nix | 3 --- 3 files changed, 3 insertions(+), 6 deletions(-) diff --git a/flake.nix b/flake.nix index ecde1a3..d664de4 100644 --- a/flake.nix +++ b/flake.nix @@ -1,6 +1,6 @@ # flake for blakes nixos config # define new devices in outputs -# generation: 323 current 2025-10-11 19:51:33 25.05.20251006.20c4598 6.12.50 * +# generation: 324 current 2025-10-11 19:52:06 25.05.20251006.20c4598 6.12.50 * { description = "blakes nix config"; inputs = { diff --git a/modules/homelab/services/gitea/default.nix b/modules/homelab/services/gitea/default.nix index ed49bb6..e828bc4 100644 --- a/modules/homelab/services/gitea/default.nix +++ b/modules/homelab/services/gitea/default.nix @@ -99,7 +99,7 @@ in proxyPass = "http://127.0.0.1:${toString cfg.port}"; extraConfig = "client_max_body_size 512M;" + - "proxy_pass http://localhost:3000;" + + "proxy_pass http://localhost:${toString cfg.port};" + "proxy_set_header Connection $http_connection;" + "proxy_set_header Upgrade $http_upgrade;" + "proxy_set_header Host $host;" + @@ -117,7 +117,7 @@ in proxyPass = "http://127.0.0.1:${toString cfg.port}"; extraConfig = "client_max_body_size 512M;" + - "proxy_pass http://localhost:3000;" + + "proxy_pass http://localhost:${toString cfg.port};" + "proxy_set_header Connection $http_connection;" + "proxy_set_header Upgrade $http_upgrade;" + "proxy_set_header Host $host;" + diff --git a/modules/homelab/services/nginx-proxy/default.nix b/modules/homelab/services/nginx-proxy/default.nix index 510e682..41e66c0 100644 --- a/modules/homelab/services/nginx-proxy/default.nix +++ b/modules/homelab/services/nginx-proxy/default.nix @@ -40,18 +40,15 @@ in restartUnits = [ "nginx.service" ]; owner = "nginx"; group = "nginx"; -# neededForUsers = true; }; "ssl_blakedheld_key" = { owner = "nginx"; group = "nginx"; -# neededForUsers = true; }; "klefki_pub.asc" = { owner = "nginx"; group = "nginx"; path = "/etc/webroot_keys/klefki_pub.asc"; -# neededForUsers = true; }; }; };