324 current 2025-10-11 19:52:06 25.05.20251006.20c4598 6.12.50 *

This commit is contained in:
2025-10-11 19:55:23 -05:00
parent e488f23b4c
commit 8903f8ac0e
3 changed files with 3 additions and 6 deletions

View File

@@ -1,6 +1,6 @@
# flake for blakes nixos config # flake for blakes nixos config
# define new devices in outputs # define new devices in outputs
# generation: 323 current 2025-10-11 19:51:33 25.05.20251006.20c4598 6.12.50 * # generation: 324 current 2025-10-11 19:52:06 25.05.20251006.20c4598 6.12.50 *
{ {
description = "blakes nix config"; description = "blakes nix config";
inputs = { inputs = {

View File

@@ -99,7 +99,7 @@ in
proxyPass = "http://127.0.0.1:${toString cfg.port}"; proxyPass = "http://127.0.0.1:${toString cfg.port}";
extraConfig = extraConfig =
"client_max_body_size 512M;" + "client_max_body_size 512M;" +
"proxy_pass http://localhost:3000;" + "proxy_pass http://localhost:${toString cfg.port};" +
"proxy_set_header Connection $http_connection;" + "proxy_set_header Connection $http_connection;" +
"proxy_set_header Upgrade $http_upgrade;" + "proxy_set_header Upgrade $http_upgrade;" +
"proxy_set_header Host $host;" + "proxy_set_header Host $host;" +
@@ -117,7 +117,7 @@ in
proxyPass = "http://127.0.0.1:${toString cfg.port}"; proxyPass = "http://127.0.0.1:${toString cfg.port}";
extraConfig = extraConfig =
"client_max_body_size 512M;" + "client_max_body_size 512M;" +
"proxy_pass http://localhost:3000;" + "proxy_pass http://localhost:${toString cfg.port};" +
"proxy_set_header Connection $http_connection;" + "proxy_set_header Connection $http_connection;" +
"proxy_set_header Upgrade $http_upgrade;" + "proxy_set_header Upgrade $http_upgrade;" +
"proxy_set_header Host $host;" + "proxy_set_header Host $host;" +

View File

@@ -40,18 +40,15 @@ in
restartUnits = [ "nginx.service" ]; restartUnits = [ "nginx.service" ];
owner = "nginx"; owner = "nginx";
group = "nginx"; group = "nginx";
# neededForUsers = true;
}; };
"ssl_blakedheld_key" = { "ssl_blakedheld_key" = {
owner = "nginx"; owner = "nginx";
group = "nginx"; group = "nginx";
# neededForUsers = true;
}; };
"klefki_pub.asc" = { "klefki_pub.asc" = {
owner = "nginx"; owner = "nginx";
group = "nginx"; group = "nginx";
path = "/etc/webroot_keys/klefki_pub.asc"; path = "/etc/webroot_keys/klefki_pub.asc";
# neededForUsers = true;
}; };
}; };
}; };