From cfc2da01c08533ba60cb3820e224b67ac942b0f2 Mon Sep 17 00:00:00 2001 From: blake Date: Thu, 9 Oct 2025 16:18:48 -0500 Subject: [PATCH] 177 current 2025-10-09 16:10:23 25.05.20251006.20c4598 6.12.50 * --- flake.lock | 17 +++++++++++++++++ flake.nix | 3 ++- modules/homelab/services/immich/default.nix | 1 + 3 files changed, 20 insertions(+), 1 deletion(-) diff --git a/flake.lock b/flake.lock index 7910967..a7bd1f2 100644 --- a/flake.lock +++ b/flake.lock @@ -36,10 +36,27 @@ "type": "indirect" } }, + "nixpkgs-unstable": { + "locked": { + "lastModified": 1759831965, + "narHash": "sha256-vgPm2xjOmKdZ0xKA6yLXPJpjOtQPHfaZDRtH+47XEBo=", + "owner": "NixOS", + "repo": "nixpkgs", + "rev": "c9b6fb798541223bbb396d287d16f43520250518", + "type": "github" + }, + "original": { + "owner": "NixOS", + "ref": "nixos-unstable", + "repo": "nixpkgs", + "type": "github" + } + }, "root": { "inputs": { "home-manager": "home-manager", "nixpkgs": "nixpkgs", + "nixpkgs-unstable": "nixpkgs-unstable", "sops-nix": "sops-nix", "vpn-confinement": "vpn-confinement" } diff --git a/flake.nix b/flake.nix index 6c9a69a..11e7167 100644 --- a/flake.nix +++ b/flake.nix @@ -1,10 +1,11 @@ # flake for blakes nixos config # define new devices in outputs -# generation: 176 current 2025-10-09 16:09:46 25.05.20251006.20c4598 6.12.50 * +# generation: 177 current 2025-10-09 16:10:23 25.05.20251006.20c4598 6.12.50 * { description = "blakes nix config"; inputs = { nixpkgs.url = "nixpkgs/nixos-25.05"; + nixpkgs-unstable.url = "github:NixOS/nixpkgs/nixos-unstable"; home-manager = { url = "github:nix-community/home-manager/release-25.05"; inputs.nixpkgs.follows = "nixpkgs"; diff --git a/modules/homelab/services/immich/default.nix b/modules/homelab/services/immich/default.nix index 2894b01..42804ea 100644 --- a/modules/homelab/services/immich/default.nix +++ b/modules/homelab/services/immich/default.nix @@ -57,6 +57,7 @@ in # enable the ${service} service services.${service} = { enable = true; + package = inputs.nixpkgs-unstable.legacyPackages.${pkgs.system}.immich; openFirewall = true; user = "${service}"; group = "${service}";